Improper Resource Shutdown or Release Affecting tcpreplay package, versions *


Severity

Recommended
0.0
low
0
10

Based on Debian security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-TCPREPLAY-12195134
  • published26 Aug 2025
  • disclosed24 Aug 2025

Introduced: 24 Aug 2025

NewCVE-2025-9384  (opens in a new tab)
CWE-404  (opens in a new tab)
CWE-476  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable tcpreplay.

NVD Description

Note: Versions mentioned in the description apply only to the upstream tcpreplay package and not the tcpreplay package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

A vulnerability was detected in appneta tcpreplay up to 4.5.1. Impacted is the function tcpedit_post_args of the file /src/tcpedit/parse_args.c. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 4.5.2-beta2 is recommended to address this issue. Upgrading the affected component is advised. The vendor explains, that he was "[a]ble to reproduce in 6fcbf03 but not in 4.5.2-beta2".

CVSS Base Scores

version 3.1