CVE-2019-15161
Publication date 30 September 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request.
Status
Package | Ubuntu Release | Status |
---|---|---|
libpcap | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Notes
sbeattie
this is likely actually fixed by 449d95265252b291711899fd288836414791930d, and thus only affects windows platforms. even if accurate, it's against the libpcap daemon, introduced in 1.9.0 and is not included in debian/ubuntu packaging
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |