First published: Wed Oct 17 2018(Updated: )
A use-after-free was discovered in the tcpbridge binary of Tcpreplay 4.3.0 beta1. The issue gets triggered in the function post_args() at tcpbridge.c, causing a denial of service or possibly unspecified other impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Tcpreplay | =4.3.0-beta1 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-18408.
The severity of CVE-2018-18408 is critical.
Broadcom Tcpreplay version 4.3.0 beta1, Fedoraproject Fedora versions 28 and 29 are affected by CVE-2018-18408.
CVE-2018-18408 can be exploited by triggering the use-after-free issue in the post_args() function of the tcpbridge binary in Tcpreplay.
Updates and patches are available from the software vendors to fix CVE-2018-18408. It is recommended to update to a patched version or apply the necessary security fixes as soon as possible.