| Summary: | tcpreplay new security issues CVE-2019-8376, CVE-2019-8377, and CVE-2019-8381 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | andrewsfarm, brtians1, geiger.david68210, sysadmin-bugs, tmb |
| Version: | 6 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA6-64-OK | ||
| Source RPM: | tcpreplay-4.3.1-1.mga6.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2019-03-28 21:09:56 CET
David Walser
2019-03-28 21:23:59 CET
Status comment:
(none) =>
Fixed upstream in 4.3.2 Advisory: ======================== Updated tcpreplay package fixes security vulnerabilities: An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_layer4_v6() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact (CVE-2019-8376). An issue was discovered in Tcpreplay 4.3.1. A NULL pointer dereference occurred in the function get_ipv6_l4proto() located at get.c. This can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact (CVE-2019-8377). An issue was discovered in Tcpreplay 4.3.1. An invalid memory access occurs in do_checksum in checksum.c. It can be triggered by sending a crafted pcap file to the tcpreplay-edit binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact (CVE-2019-8381). References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8376 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8377 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8381 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4V3SADKXUSHWTVAPU3WLXBDEQUHRA6ZO/ ======================== Updated packages in core/updates_testing: ======================== tcpreplay-4.3.2-1.mga6 from tcpreplay-4.3.2-1.mga6.src.rpm Status comment:
Fixed upstream in 4.3.2 =>
(none) The following 2 packages are going to be installed: - meta-task-6-3.3.mga6.noarch - tcpreplay-4.3.2-1.mga6.x86_64 1.3MB of additional disk space will be used. 343KB of packages will be retrieved. I had installed tcpdump. I ran this test against an unencrypted internal ftp server I had laying around. # tcpdump -w dmp1.pcap I did an FTP login and get a file (which is unimportant). Then I did an tcpreplay with # tcpreplay -v --intf1=enp0s3 dmp1.pcap It will then run through the pcap file processing the transactions (do this only to internal servers you are controlling, else you may be considered a hacker). I didn't test the weakness, but the utility is working as designed. I'm approving it. Whiteboard:
(none) =>
MGA6-64-OK Going with it. Validating. Advisory in Comment 2. Keywords:
(none) =>
validated_update
Thomas Backlund
2019-05-12 08:59:40 CEST
CC:
(none) =>
tmb An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2019-0158.html Resolution:
(none) =>
FIXED |