CVE-2023-7256
- EPSS 0.09%
- Veröffentlicht 31.08.2024 00:15:05
- Zuletzt bearbeitet 19.09.2024 17:53:15
In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remai...
CVE-2024-8006
- EPSS 0.05%
- Veröffentlicht 31.08.2024 00:15:05
- Zuletzt bearbeitet 19.09.2024 17:46:03
Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a file...
CVE-2019-15161
- EPSS 2.53%
- Veröffentlicht 03.10.2019 19:15:09
- Zuletzt bearbeitet 21.11.2024 04:28:10
rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request.
CVE-2019-15162
- EPSS 1.04%
- Veröffentlicht 03.10.2019 19:15:09
- Zuletzt bearbeitet 21.11.2024 04:28:10
rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames.
CVE-2019-15163
- EPSS 0.78%
- Veröffentlicht 03.10.2019 19:15:09
- Zuletzt bearbeitet 21.11.2024 04:28:11
rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
CVE-2019-15164
- EPSS 1.66%
- Veröffentlicht 03.10.2019 19:15:09
- Zuletzt bearbeitet 21.11.2024 04:28:11
rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source.
CVE-2019-15165
- EPSS 1.19%
- Veröffentlicht 03.10.2019 19:15:09
- Zuletzt bearbeitet 21.11.2024 04:28:11
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
CVE-2011-1935
- EPSS 1.25%
- Veröffentlicht 20.10.2017 18:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets.