Use-after-free in Tcpreplay - CVE-2018-18408
Published: October 17, 2018 / Updated: June 1, 2021
Vulnerability identifier: #VU36497
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2018-18408
CWE-ID: CWE-416
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: AppNeta
Affected software:
Tcpreplay
Tcpreplay
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4.3.0 beta1. The issue gets triggered in the function post_args() at tcpbridge.c, causing a denial of service or possibly unspecified other impact.
How to mitigate CVE-2018-18408
Install update from vendor's website.
Sources
- https://github.com/appneta/tcpreplay/issues/489
- https://github.com/SegfaultMasters/covering360/blob/master/tcpreplay/README.md#use-after-free-in-post_args
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V3SADKXUSHWTVAPU3WLXBDEQUHRA6ZO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MLPY6W7Z7G6PF2JN4LXXHCACYLD4RBG6/