2024-09-19 18:03:16 +00:00

118 lines
3.9 KiB
JSON

{
"id": "CVE-2023-7256",
"sourceIdentifier": "security@tcpdump.org",
"published": "2024-08-31T00:15:05.240",
"lastModified": "2024-09-19T17:53:15.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400."
},
{
"lang": "es",
"value": "En las versiones de libpcap afectadas, durante la configuraci\u00f3n de una captura de paquetes remota, la funci\u00f3n interna sock_initaddress() llama a getaddrinfo() y posiblemente a freeaddrinfo(), pero no indica claramente a la funci\u00f3n que la llama si a\u00fan queda por llamar a freeaddrinfo() despu\u00e9s de que la funci\u00f3n regrese. Esto hace posible en algunos escenarios que tanto la funci\u00f3n como su llamador llamen a freeaddrinfo() para el mismo bloque de memoria asignado. Se inform\u00f3 un problema similar en Apple libpcap, al que Apple le asign\u00f3 CVE-2023-40400."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "security@tcpdump.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
},
{
"source": "security@tcpdump.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tcpdump:libpcap:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.10.5",
"matchCriteriaId": "83511DB8-7FA5-4C5D-8E9D-B6310A1006C4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/the-tcpdump-group/libpcap/commit/262e4f34979872d822ccedf9f318ed89c4d31c03",
"source": "security@tcpdump.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/the-tcpdump-group/libpcap/commit/2aa69b04d8173b18a0e3492e0c8f2f7fabdf642d",
"source": "security@tcpdump.org",
"tags": [
"Patch"
]
}
]
}