First published: Sat Mar 26 2022(Updated: )
tcpprep in Tcpreplay 4.4.1 has a heap-based buffer over-read in parse_mpls in common/get.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom Tcpreplay | =4.4.1 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-27942.
The severity of CVE-2022-27942 is high (7.8).
Tcpreplay version 4.4.1 is affected by CVE-2022-27942.
The CWE ID of CVE-2022-27942 is CWE-125.
Yes, you can find references for CVE-2022-27942 at the following links: - [GitHub Issue](https://github.com/appneta/tcpreplay/issues/719) - [Fedora Project Announcement 1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/) - [Fedora Project Announcement 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/)