ALT-BU-2025-11872-2
Branch c10f2 update bulletin.
Closed vulnerabilities
Modified: 2025-09-11
CVE-2025-9019
A vulnerability has been found in tcpreplay 4.5.1. This vulnerability affects the function mask_cidr6 of the file cidr.c of the component tcpprep. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The researcher is able to reproduce this with the latest official release 4.5.1 and the current master branch. The code maintainer cannot reproduce this for 4.5.2-beta1. In his reply the maintainer explains that "[i]n that case, this is a duplicate that was fixed in 4.5.2."
- https://drive.google.com/file/d/13SQYVIb_YQoRfaJaaLf6iLtMiCRCHlBc/view?usp=sharing
- https://github.com/appneta/tcpreplay/issues/958
- https://github.com/appneta/tcpreplay/issues/958#issuecomment-3124876035
- https://github.com/appneta/tcpreplay/issues/959
- https://vuldb.com/?ctiid.320080
- https://vuldb.com/?id.320080
- https://vuldb.com/?submit.623635
- https://vuldb.com/?submit.623636
- https://vuldb.com/?submit.623637
- https://vuldb.com/?submit.623638
- https://vuldb.com/?submit.623639
- https://github.com/appneta/tcpreplay/issues/958
- https://github.com/appneta/tcpreplay/issues/959
- https://vuldb.com/?submit.623639
Closed vulnerabilities
Modified: 2025-09-05
CVE-2025-9732
A vulnerability was identified in DCMTK up to 3.6.9. This affects an unknown function in the library dcmimage/include/dcmtk/dcmimage/diybrpxt.h of the component dcm2img. Such manipulation leads to memory corruption. Local access is required to approach this attack. The name of the patch is 7ad81d69b. It is best practice to apply a patch to resolve this issue.
Closed vulnerabilities
Modified: 2025-08-04
CVE-2025-54386
Traefik is an HTTP reverse proxy and load balancer. In versions 2.11.27 and below, 3.0.0 through 3.4.4 and 3.5.0-rc1, a path traversal vulnerability was discovered in WASM Traefikās plugin installation mechanism. By supplying a maliciously crafted ZIP archive containing file paths with ../ sequences, an attacker can overwrite arbitrary files on the system outside of the intended plugin directory. This can lead to remote code execution (RCE), privilege escalation, persistence, or denial of service. This is fixed in versions 2.11.28, 3.4.5 and 3.5.0.
- https://github.com/traefik/plugin-service/pull/71
- https://github.com/traefik/plugin-service/pull/72
- https://github.com/traefik/traefik/commit/5ef853a0c53068f69a6c229a5815a0dc6e0a8800
- https://github.com/traefik/traefik/pull/11911
- https://github.com/traefik/traefik/releases/tag/v2.11.28
- https://github.com/traefik/traefik/security/advisories/GHSA-q6gg-9f92-r9wg
Modified: 2025-08-04
GHSA-q6gg-9f92-r9wg
Traefik Client Plugin's Path Traversal Vulnerability Allows Arbitrary File Overwrite and Remote Code Execution
- https://github.com/traefik/traefik/security/advisories/GHSA-q6gg-9f92-r9wg
- https://nvd.nist.gov/vuln/detail/CVE-2025-54386
- https://github.com/traefik/plugin-service/pull/71
- https://github.com/traefik/plugin-service/pull/72
- https://github.com/traefik/traefik/pull/11911
- https://github.com/traefik/traefik/commit/5ef853a0c53068f69a6c229a5815a0dc6e0a8800
- https://github.com/traefik/traefik
- https://github.com/traefik/traefik/releases/tag/v2.11.28