ID CVE-2020-12740
Summary tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
References
Vulnerable Configurations
  • cpe:2.3:a:broadcom:tcpreplay:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.2:-:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.2:-:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.2:a:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.2:a:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3:beta3:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3:beta3:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3:beta4:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3:beta4:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3:beta5:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3:beta5:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3:beta6:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3:beta6:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4:beta3:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4:beta3:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4:beta4:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4:beta4:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4:beta5:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4:beta5:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:1.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:1.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:2.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:2.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta10:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta10:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta11:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta11:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta12:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta12:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta13:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta13:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta5:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta5:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta6:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta6:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta7:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta7:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta8:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta8:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0:beta9:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0:beta9:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.0rc1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.0rc1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:3.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:3.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.5:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.5:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.5:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.5:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.0.5:beta3:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.0.5:beta3:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.1.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.1.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.1.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.1.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.1.1:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.1.1:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.1.1:beta3:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.1.1:beta3:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.2:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.2:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.5:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.5:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.6:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.6:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.2.6:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.2.6:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.3.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.3.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.3.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.3.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:broadcom:tcpreplay:4.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:broadcom:tcpreplay:4.3.2:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
  • cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
    cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 08-04-2022 - 10:35)
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Infiltration of Hardware Development Environment
    An attacker, leveraging the ability to manipulate components of primary support systems and tools within the development and production environments, inserts malicious software within the hardware and/or firmware development environment. The infiltration purpose is to alter developed hardware components in a system destined for deployment at the victim's organization, for the purpose of disruption or further compromise.
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:P
refmap via4
fedora
  • FEDORA-2020-256ac53cc7
  • FEDORA-2020-f47830961a
misc https://github.com/appneta/tcpreplay/issues/576
Last major update 08-04-2022 - 10:35
Published 08-05-2020 - 18:15
Last modified 08-04-2022 - 10:35
Back to Top