Search CVE reports
1 – 8 of 8 results
CVE-2024-8006
Medium priorityRemote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function...
1 affected packages
libpcap
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libpcap | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2023-7256
Medium priorityIn affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether...
1 affected packages
libpcap
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libpcap | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2019-15165
Medium prioritysf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
1 affected packages
libpcap
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libpcap | — | — | — | Fixed | Fixed |
CVE-2019-15164
Medium priorityrpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source.
1 affected packages
libpcap
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libpcap | — | — | — | Not affected | Not affected |
CVE-2019-15163
Medium priorityrpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
1 affected packages
libpcap
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libpcap | — | — | — | Not affected | Not affected |
CVE-2019-15162
Medium priorityrpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames.
1 affected packages
libpcap
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libpcap | — | — | — | Not affected | Not affected |
CVE-2019-15161
Medium priorityrpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request.
1 affected packages
libpcap
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libpcap | — | — | — | Not affected | Not affected |
CVE-2011-1935
Low prioritypcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets.
1 affected packages
libpcap
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libpcap | — | — | — | — | — |