SB2020061542 - Fedora 31 update for tcpreplay



SB2020061542 - Fedora 31 update for tcpreplay

Published: June 15, 2020 Updated: April 25, 2025

Security Bulletin ID SB2020061542
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) NULL pointer dereference (CVE-ID: CVE-2019-8377)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to NULL pointer dereference condition that exists in the get_ipv6_l4proto()function, as defined in the get.c source code file. A remote attacker can send a specially crafted packet capture (pcap) file to the tcpreplay-edit binary, trigger a segmentation fault and cause a DoS condition.


2) Out-of-bounds read (CVE-ID: CVE-2020-12740)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c. A remote attacker can perform a denial of service attack.


Remediation

Install update from vendor's website.