A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restricted to local execution. The exploit has been published and may be used. Upgrading to version 4.5.2-beta3 is sufficient to fix this issue. It is advisable to upgrade the affected component.
References
| Link | Resource |
|---|---|
| https://drive.google.com/file/d/1BQZF558bRHv07wtlCoZgtqTlEpHgfytp/view?usp=sharing | Exploit |
| https://github.com/appneta/tcpreplay/issues/972 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/appneta/tcpreplay/issues/972#issuecomment-3199019278 | Issue Tracking |
| https://vuldb.com/?ctiid.321218 | Permissions Required VDB Entry |
| https://vuldb.com/?id.321218 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.630497 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-08-24 11:15
Updated : 2025-10-06 18:36
NVD link : CVE-2025-9385
Mitre link : CVE-2025-9385
CVE.ORG link : CVE-2025-9385
JSON object : View
Products Affected
broadcom
- tcpreplay
