|Link||package | bugs open | bugs closed | Wiki | GitHub | web search|
|Description||Gives the ability to replay previously captured traffic in a libpcap format|
|CVE-2019-8381||AVG-902||High||No||Arbitrary code execution||
An issue was discovered in Tcpreplay 4.3.1. An invalid memory access occurs in do_checksum in checksum.c. It can be triggered by sending a crafted pcap file...
|CVE-2019-8377||AVG-902||High||Yes||Denial of service||
An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered...
|CVE-2019-8376||AVG-902||High||Yes||Denial of service||
An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_layer4_v6() located at get.c. This can be triggered by...
|CVE-2017-6429||AVG-211||High||No||Arbitrary code execution||
Buffer overflow in the tcpcapinfo utility in tcpreplay before 4.2.0 Beta 1 allows attackers to have unspecified impact via a pcap file with an over-size packet.
|23 Jun 2017||ASA-201706-29||AVG-211||High||arbitrary code execution|