{"id":"CVE-2025-9385","details":"A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restricted to local execution. The exploit has been published and may be used. Upgrading to version 4.5.2-beta3 is sufficient to fix this issue. It is advisable to upgrade the affected component.","modified":"2026-04-10T05:36:38.493600Z","published":"2025-08-24T11:15:33.483Z","related":["openSUSE-SU-2025:20119-1"],"references":[{"type":"ADVISORY","url":"https://vuldb.com/?id.321218"},{"type":"ADVISORY","url":"https://vuldb.com/?submit.630497"},{"type":"REPORT","url":"https://github.com/appneta/tcpreplay/issues/972#issuecomment-3199019278"},{"type":"REPORT","url":"https://vuldb.com/?ctiid.321218"},{"type":"REPORT","url":"https://github.com/appneta/tcpreplay/issues/972"},{"type":"EVIDENCE","url":"https://drive.google.com/file/d/1BQZF558bRHv07wtlCoZgtqTlEpHgfytp/view?usp=sharing"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/appneta/tcpreplay","events":[{"introduced":"0"},{"last_affected":"0ba7d17fcb9ddedf61168f99c249b30731310d4e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.5.1"}]}}],"versions":["v3.4.2","v3.4.3","v3.4.4","v4.0.0","v4.0.0beta1","v4.0.0beta2","v4.0.1","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.5beta1","v4.0.5beta2","v4.0.5beta3","v4.1.0","v4.1.0beta1","v4.1.0beta2","v4.1.1","v4.1.1-beta2","v4.1.1-beta3","v4.1.2","v4.2.6","v4.4.3","v4.5.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-9385.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}