MGASA-2024-0305

Source
https://advisories.mageia.org/MGASA-2024-0305.html
Import Source
https://advisories.mageia.org/MGASA-2024-0305.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0305
Related
Published
2024-09-16T17:44:44Z
Modified
2024-09-16T17:13:10Z
Summary
Updated tcpreplay package fix security vulnerability
Details

A vulnerability was found in appneta tcpreplay up to 4.4.4. It has been classified as problematic. This affects the function getlayer4v6 of the file /tcpreplay/src/common/get.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-258333 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

References
Credits

Affected packages

Mageia:9 / tcpreplay

Package

Name
tcpreplay
Purl
pkg:rpm/mageia/tcpreplay?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1-1.mga9

Ecosystem specific

{
    "section": "core"
}