CVE-2025-9157: Use After Free in appneta tcpreplay
A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. This patch is called 73008f261f1cdf7a1087dc8759115242696d35da. Applying a patch is advised to resolve this issue.
CVE-2025-9157: Use After Free in appneta tcpreplay
Description
A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. This patch is called 73008f261f1cdf7a1087dc8759115242696d35da. Applying a patch is advised to resolve this issue.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T09:26:39.372Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a4dbedad5a09ad00fac85d
Added to database: 8/19/2025, 8:17:49 PM
Last updated: 8/19/2025, 8:17:49 PM
Views: 1
Related Threats
CVE-2025-9165: Memory Leak in LibTIFF
MediumCVE-2025-51529: n/a
MediumCVE-2025-50579: n/a
MediumCVE-2025-55740: CWE-1392: Use of Default Credentials in Anipaleja nginx-defender
MediumCVE-2025-51543: n/a
HighActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.