ASA-201706-29 log generated external raw

[ASA-201706-29] tcpreplay: arbitrary code execution
Arch Linux Security Advisory ASA-201706-29 ========================================== Severity: High Date : 2017-06-23 CVE-ID : CVE-2017-6429 Package : tcpreplay Type : arbitrary code execution Remote : No Link : Summary ======= The package tcpreplay before version 4.2.5-1 is vulnerable to arbitrary code execution. Resolution ========== Upgrade to 4.2.5-1. # pacman -Syu "tcpreplay>=4.2.5-1" The problem has been fixed upstream in version 4.2.5. Workaround ========== None. Description =========== Buffer overflow in the tcpcapinfo utility in tcpreplay before 4.2.0 Beta 1 allows attackers to have unspecified impact via a pcap file with an over-size packet. Impact ====== An attacker can provide a crafted pcap file with an over-size packet to execute arbitrary code with the privileges of the tcpcapinfo process. References ==========