Search CVE reports


Toggle filters

1 – 10 of 10 results


CVE-2025-11964

Medium priority
Not affected

On Windows only, if libpcap needs to convert a Windows error message to UTF-8 and the message includes characters that UTF-8 represents using 4 bytes, utf_16le_to_utf_8_truncated() can write data beyond the end of the provided buffer.

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Not affected Not affected Not affected Not affected
Show less packages

CVE-2025-11961

Low priority
Needs evaluation

pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this...

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2024-8006

Medium priority
Not affected

Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function...

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Not affected Not affected Not affected Not affected
Show less packages

CVE-2023-7256

Medium priority
Not affected

In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether...

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Not affected Not affected Not affected Not affected
Show less packages

CVE-2019-15165

Medium priority
Fixed

sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Fixed
Show less packages

CVE-2019-15164

Medium priority
Not affected

rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source.

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Not affected
Show less packages

CVE-2019-15163

Medium priority
Not affected

rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Not affected
Show less packages

CVE-2019-15162

Medium priority
Not affected

rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames.

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Not affected
Show less packages

CVE-2019-15161

Medium priority
Not affected

rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request.

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap Not affected
Show less packages

CVE-2011-1935

Low priority
Ignored

pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets.

1 affected package

libpcap

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
libpcap
Show less packages