Bug 1110285 - (CVE-2018-17582) VUL-1: CVE-2018-17582: tcpreplay: The get_next_packet() function in the send_packets.c file uses the memcpy() function unsafely to copy sequences from the source buffer pktdata
(CVE-2018-17582)
VUL-1: CVE-2018-17582: tcpreplay: The get_next_packet() function in the send_...
Status: REOPENED
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.1
Other Other
: P4 - Low : Minor (vote)
: ---
Assigned To: Michal Kubeček
Security Team bot
https://smash.suse.de/issue/215887/
CVSSv3:RedHat:CVE-2018-17582:3.3:(AV...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2018-10-01 07:31 UTC by Karol Babioch
Modified: 2020-01-16 14:32 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Karol Babioch 2018-10-01 07:31:28 UTC
CVE-2018-17582

tcpreplay v4.3.0 contains a heap-based buffer over-read. The get_next_packet()
function in the send_packets.c file uses the memcpy() function unsafely to copy
sequences from the source buffer pktdata to the destination
(*prev_packet)->pktdata. This will result in a Denial of Service (DoS) and
potentially Information Exposure when the application attempts to process a
file.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-17582
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-17582.html
https://github.com/appneta/tcpreplay/issues/484
Comment 1 Karol Babioch 2018-10-01 07:44:19 UTC
Since 4.3.0 is not yet released, this is not a problem for us.
Comment 2 Michal Kubeček 2018-10-03 08:12:02 UTC
Reopening. While the CVE talks about version 4.3.0 Beta 1, the code in question
is much older and works the same way in version 4.2.6 (Tumbleweed, 15.0) and
4.1.2 (42.3).
Comment 3 Tomáš Chvátal 2019-07-11 11:34:49 UTC
This is automated batch bugzilla cleanup.

The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such
it is no longer maintained, which means that it will not receive any
further security or bug fix updates.
As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of 
openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please
feel free to reopen this bug against that version (!you must update the
"Version" component in the bug fields, do not just reopen please), or
alternatively create a new ticket.

Thank you for reporting this bug and we are sorry it could not be fixed
during the lifetime of the release.

[1] https://en.opensuse.org/Lifetime
Comment 4 Marcus Meissner 2019-07-11 15:45:10 UTC
15.0 and 15.1 unfixed