CVE-2019-15165

CVSS V2 Medium 5 CVSS V3 Medium 5.3
Description
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
Overview
  • CVE ID
  • CVE-2019-15165
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2019-10-03T19:15:09
  • Last Modified Date
  • 2022-04-08T13:27:03
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:tcpdump:libpcap:*:*:*:*:*:*:*:* 1 OR 1.9.1
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:ipados:13.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:13.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* 1 OR 10.13 10.13.6
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:mac_os_x:10.15.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:tvos:13.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:watchos:6.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 5.3
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 3.9
  • Impact Score
  • 1.4
References
Reference URL Reference Tags
https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES Product Release Notes
https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6 Patch Third Party Advisory
https://www.tcpdump.org/public-cve-list.txt Vendor Advisory
https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00031.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZTIPUWABYUE5KQOLCKAW65AUUSB7QO6/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F/ Mailing List Third Party Advisory
https://support.apple.com/kb/HT210788 Third Party Advisory
https://usn.ubuntu.com/4221-1/ Third Party Advisory
https://seclists.org/bugtraq/2019/Dec/23 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Dec/26 Issue Tracking Mailing List Third Party Advisory
https://usn.ubuntu.com/4221-2/ Third Party Advisory
https://support.apple.com/kb/HT210790 Third Party Advisory
https://support.apple.com/kb/HT210785 Third Party Advisory
https://support.apple.com/kb/HT210789 Third Party Advisory
https://www.oracle.com/security-alerts/cpuapr2020.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00014.html Mailing List Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:29:03 Added to TrackCVE
2022-12-04 03:46:54 2019-10-03T19:15Z 2019-10-03T19:15:09 CVE Published Date updated
2022-12-04 03:46:54 2022-04-08T13:27:03 CVE Modified Date updated
2022-12-04 03:46:54 Analyzed Vulnerability Status updated