Lucene search

K
redhatcveRedhat.comRH:CVE-2023-7256
HistorySep 02, 2024 - 6:40 a.m.

CVE-2023-7256

2024-09-0206:40:42
redhat.com
access.redhat.com
5
cve-2023-7256
libpcap
remote packet capture
sock_initaddress()
getaddrinfo()
freeaddrinfo()
memory block

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

Low

A vulnerability was found in libpcap. During the setup of a remote packet capture, the internal sock_initaddress() function calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function as to whether freeaddrinfo() remains to be called after the function returns. This issue makes it possible in some scenarios that the function and its caller call freeaddrinfo() for the same allocated memory block.

Mitigation

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

6.6

Confidence

Low