
Cloud Vulnerability DB
A community-led vulnerabilities database
Tcpreplay version 4.4.1 was discovered to contain a double-free vulnerability via _interceptorfree. The vulnerability was identified with CVE-2022-27416 and affects the core functionality of the Tcpreplay utility, which is used for editing and replaying network traffic previously captured by tools like tcpdump and Wireshark (Debian Tracker, Gentoo Advisory).
The vulnerability is a double-free issue that occurs in the memory management of Tcpreplay. When triggered, the application attempts to free memory that has already been deallocated, specifically at memory location 0x60c0000001c0. The issue manifests in the tcpeditdltcleanup function within the plugins/dlt_plugins.c file. The vulnerability was discovered through testing with Address Sanitizer (ASAN) and has a CVSS v3 Base Score of 7.8 (High), with an Impact Score of 5.9 and Exploitability Score of 1.8 (AttackerKB).
The vulnerability has high potential impact on system Confidentiality, Integrity, and Availability. When exploited, it could lead to program crashes, resulting in denial of service conditions. The CVSS metrics indicate high impact scores for all three security properties (AttackerKB).
The vulnerability has been fixed in Tcpreplay version 4.4.2. Users are advised to upgrade to this version or later. For Gentoo users, the recommended action is to execute 'emerge --sync' followed by 'emerge --ask --oneshot --verbose ">=net-analyzer/tcpreplay-4.4.2"' (Gentoo Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."