CVE-2019-15161Incorrect Calculation of Buffer Size in Libpcap

Severity
5.3MEDIUMNVD
EPSS
2.5%
top 14.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 3
Latest updateMay 24

Description

rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

NVDtcpdump/libpcap< 1.9.1
Debiantcpdump/libpcap< 1.9.1-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-mpx8-phwc-v8wq: rpcapd/daemon2022-05-24
CVEList
CVE-2019-15161: rpcapd/daemon2019-10-03
OSV
CVE-2019-15161: rpcapd/daemon2019-10-03

📋Vendor Advisories

5
Apple
CVE-2019-15161: watchOS 6.1.12019-12-10
Apple
CVE-2019-15161: iOS 13.3 and iPadOS 13.32019-12-10
Apple
CVE-2019-15161: tvOS 13.32019-12-10
Red Hat
libpcap: Mishandled length values in reused variables2019-09-20
Debian
CVE-2019-15161: libpcap - rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because...2019

💬Community

2
Bugzilla
CVE-2019-15161 libpcap: Mishandled length values in reused variables2019-10-10
Bugzilla
CVE-2018-16301 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 libpcap: various flaws [fedora-all]2019-10-10
CVE-2019-15161 — Incorrect Calculation of Buffer Size | cvebase