[ASA-201706-29] tcpreplay: arbitrary code execution

2017-06-23T00:00:00
ID ASA-201706-29
Type archlinux
Reporter ArchLinux
Modified 2017-06-23T00:00:00

Description

Arch Linux Security Advisory ASA-201706-29

Severity: High Date : 2017-06-23 CVE-ID : CVE-2017-6429 Package : tcpreplay Type : arbitrary code execution Remote : No Link : https://security.archlinux.org/AVG-211

Summary

The package tcpreplay before version 4.2.5-1 is vulnerable to arbitrary code execution.

Resolution

Upgrade to 4.2.5-1.

pacman -Syu "tcpreplay>=4.2.5-1"

The problem has been fixed upstream in version 4.2.5.

Workaround

None.

Description

Buffer overflow in the tcpcapinfo utility in tcpreplay before 4.2.0 Beta 1 allows attackers to have unspecified impact via a pcap file with an over-size packet.

Impact

An attacker can provide a crafted pcap file with an over-size packet to execute arbitrary code with the privileges of the tcpcapinfo process.

References

https://github.com/appneta/tcpreplay/commit/d689d14dbcd768c028eab2fb378d849e543dcfe9 https://github.com/appneta/tcpreplay/issues/278 http://www.securityfocus.com/bid/96579 https://security.archlinux.org/CVE-2017-6429