CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
82.0%
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
Vendor | Product | Version | CPE |
---|---|---|---|
tcpdump | libpcap | * | cpe:2.3:a:tcpdump:libpcap:*:*:*:*:*:*:*:* |
debian | debian_linux | 8.0 | cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
debian | debian_linux | 9.0 | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
opensuse | leap | 15.0 | cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* |
opensuse | leap | 15.1 | cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
oracle | communications_operations_monitor | 3.4 | cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* |
oracle | communications_operations_monitor | 4.0 | cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:* |
oracle | communications_operations_monitor | 4.1 | cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:* |
oracle | communications_operations_monitor | 4.2 | cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:* |
oracle | communications_operations_monitor | 4.3 | cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html
seclists.org/fulldisclosure/2019/Dec/26
github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab
github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
lists.debian.org/debian-lts-announce/2019/10/msg00031.html
lists.debian.org/debian-lts-announce/2021/12/msg00014.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZTIPUWABYUE5KQOLCKAW65AUUSB7QO6/
seclists.org/bugtraq/2019/Dec/23
support.apple.com/kb/HT210785
support.apple.com/kb/HT210788
support.apple.com/kb/HT210789
support.apple.com/kb/HT210790
usn.ubuntu.com/4221-1/
usn.ubuntu.com/4221-2/
www.oracle.com/security-alerts/cpuapr2020.html
www.tcpdump.org/public-cve-list.txt
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
82.0%