Vulnerabilidad en encabezado PHB en el archivo sf-pcapng.c en libpcap. (CVE-2019-15165)
Gravedad CVSS v3.1:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
03/10/2019
Última modificación:
03/12/2025
Descripción
En el archivo sf-pcapng.c en libpcap versiones anteriores a 1.9.1, no comprueba apropiadamente la longitud del encabezado PHB antes de asignar la memoria.
Impacto
Puntuación base 3.x
5.30
Gravedad 3.x
MEDIA
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:tcpdump:libpcap:*:*:*:*:*:*:*:* | 1.9.1 (excluyendo) | |
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:ipados:13.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:iphone_os:13.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 10.13 (incluyendo) | 10.13.6 (excluyendo) |
| cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab
- https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
- https://lists.debian.org/debian-lts-announce/2019/10/msg00031.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00014.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZTIPUWABYUE5KQOLCKAW65AUUSB7QO6/
- https://seclists.org/bugtraq/2019/Dec/23
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://usn.ubuntu.com/4221-1/
- https://usn.ubuntu.com/4221-2/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.tcpdump.org/public-cve-list.txt
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab
- https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
- https://lists.debian.org/debian-lts-announce/2019/10/msg00031.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00014.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZTIPUWABYUE5KQOLCKAW65AUUSB7QO6/
- https://seclists.org/bugtraq/2019/Dec/23
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://usn.ubuntu.com/4221-1/
- https://usn.ubuntu.com/4221-2/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.tcpdump.org/public-cve-list.txt



