
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap buffer overflow vulnerability has been discovered in tcpreplay version 4.5.1, specifically affecting the mask_cidr6 function in the cidr.c file of the tcpprep component. The vulnerability was identified in July 2025 and has been assigned CVE-2025-9019. The issue affects tcpreplay versions up to 4.5.1, with confirmation that it has been fixed in version 4.5.2-beta1 (GitHub Issue).
The vulnerability is caused by insufficient bounds checking in the IPv6 CIDR mask processing logic within the maskcidr6 function. The issue occurs when memory is allocated via oursafestrdup in doOptInclude for a 2-byte string, which is then processed through a chain including parsexXstr and parsecidr. The function attempts to read beyond allocated memory boundaries when processing malformed IPv6 addresses. The vulnerability has received a CVSS v4.0 score of 2.3 (Low) and CVSS v3.1 score of 3.1 (Low), indicating relatively low severity but potential for exploitation (NVD).
The vulnerability can lead to heap buffer overflow conditions where the program reads past the end of a dynamically allocated buffer, potentially accessing uninitialized or attacker-controlled memory. This can result in memory corruption and program crashes (GitHub Issue).
The vulnerability has been fixed in tcpreplay version 4.5.2-beta1. Users are advised to upgrade to this version or later when available. The code maintainer has confirmed that the issue is resolved in the beta release (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."