ArchLinux: 201905-5: tcpreplay: multiple issues
Summary
- CVE-2019-8376 (denial of service)
An issue was discovered in tcpreplay 4.3.1. A NULL pointer dereference
occurred in the function get_layer4_v6() located at get.c. This can be
triggered by sending a crafted pcap file to the tcpreplay-edit binary.
It allows an attacker to cause a Denial of Service (Segmentation fault)
or possibly have unspecified other impact.
- CVE-2019-8377 (denial of service)
An issue was discovered in tcpreplay 4.3.1. A NULL pointer dereference
occurred in the function get_ipv6_l4proto() located at get.c. This can
be triggered by sending a crafted pcap file to the tcpreplay-edit
binary. It allows an attacker to cause a Denial of Service
(Segmentation fault) or possibly have unspecified other impact.
- CVE-2019-8381 (arbitrary code execution)
An issue was discovered in tcpreplay 4.3.1. An invalid memory access
occurs in do_checksum in checksum.c. It can be triggered by sending a
crafted pcap file to the tcpreplay-edit binary. It allows an attacker
to cause a Denial of Service (Segmentation fault) or possibly have
unspecified other impact.
Resolution
Upgrade to 4.3.2-1.
# pacman -Syu "tcpreplay>=4.3.2-1"
The problems have been fixed upstream in version 4.3.2.
References
https://github.com/appneta/tcpreplay/issues/537 https://research.loginsoft.com/vulnerability/null-pointer-dereference-vulnerability-in-function-get_layer4_v6-tcpreplay-4-3-1/ https://github.com/appneta/tcpreplay/issues/536 https://research.loginsoft.com/vulnerability/null-pointer-dereference-vulnerability-in-function-get_ipv6_l4proto-tcpreplay-4-3-1/ https://research.loginsoft.com/vulnerability/invalid-memory-access-vulnerability-in-function-do_checksum-tcpreplay-4-3-1/ https://github.com/appneta/tcpreplay/issues/538 https://github.com/appneta/tcpreplay/pull/548/commits/dae97cbafc5c06ebbc6b34e76ba614104f1b73e1 https://security.archlinux.org/CVE-2019-8376 https://security.archlinux.org/CVE-2019-8377 https://security.archlinux.org/CVE-2019-8381
Workaround
None.