CVE-2024-8006 (GCVE-0-2024-8006)

Vulnerability from cvelistv5 – Published: 2024-08-30 23:53 – Updated: 2024-09-03 19:17
VLAI?
Summary
Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.
CWE
  • CWE-476 - NULL Pointer Dereference
Assigner
Impacted products
Vendor Product Version
The Tcpdump Group libpcap Affected: 1.9.x
Affected: 1.10.x , ≤ 1.10.4 (semver)
Create a notification for this product.
Credits
Flavio Toffalini Nicolas Badoux
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-8006",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-03T19:17:39.415802Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-03T19:17:49.301Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "remote packet capture"
          ],
          "product": "libpcap",
          "programRoutines": [
            {
              "name": "pcap_findalldevs_ex()"
            }
          ],
          "repo": "https://github.com/the-tcpdump-group/libpcap/",
          "vendor": "The Tcpdump Group",
          "versions": [
            {
              "status": "affected",
              "version": "1.9.x"
            },
            {
              "lessThanOrEqual": "1.10.4",
              "status": "affected",
              "version": "1.10.x",
              "versionType": "semver"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "value": "The problem is specific to the remote packet capture code, which is not enabled in the default build configuration."
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Flavio Toffalini"
        },
        {
          "lang": "en",
          "type": "reporter",
          "value": "Nicolas Badoux"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "A functional exploit exists."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476 NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-30T23:53:11.334Z",
        "orgId": "cfdbb673-b408-4d03-89c1-c3d73ed80896",
        "shortName": "Tcpdump"
      },
      "references": [
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/the-tcpdump-group/libpcap/commit/0f8a103469ce87d2b8d68c5130a46ddb7fb5eb29"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/the-tcpdump-group/libpcap/commit/8a633ee5b9ecd9d38a587ac9b204e2380713b0d6"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Upgrade to libpcap 1.10.5."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "NULL pointer dereference in libpcap before 1.10.5 with remote packet capture support",
      "workarounds": [
        {
          "lang": "en",
          "value": "Do not build libpcap with remote packet capture support."
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cfdbb673-b408-4d03-89c1-c3d73ed80896",
    "assignerShortName": "Tcpdump",
    "cveId": "CVE-2024-8006",
    "datePublished": "2024-08-30T23:53:11.334Z",
    "dateReserved": "2024-08-20T09:58:58.455Z",
    "dateUpdated": "2024-09-03T19:17:49.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tcpdump:libpcap:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.10.5\", \"matchCriteriaId\": \"83511DB8-7FA5-4C5D-8E9D-B6310A1006C4\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.\"}, {\"lang\": \"es\", \"value\": \"La compatibilidad con captura remota de paquetes est\\u00e1 deshabilitada de forma predeterminada en libpcap. Cuando un usuario compila libpcap con la compatibilidad con captura remota de paquetes habilitada, una de las funciones que se vuelven disponibles es pcap_findalldevs_ex(). Uno de los argumentos de la funci\\u00f3n puede ser una ruta del sistema de archivos, que normalmente significa un directorio con archivos de datos de entrada. Cuando la ruta especificada no se puede usar como directorio, la funci\\u00f3n recibe NULL de opendir(), pero no verifica el valor de retorno y pasa el valor NULL a readdir(), lo que provoca una desreferencia del puntero NULL.\"}]",
      "id": "CVE-2024-8006",
      "lastModified": "2024-09-19T17:46:03.447",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@tcpdump.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 4.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 3.6}]}",
      "published": "2024-08-31T00:15:05.743",
      "references": "[{\"url\": \"https://github.com/the-tcpdump-group/libpcap/commit/0f8a103469ce87d2b8d68c5130a46ddb7fb5eb29\", \"source\": \"security@tcpdump.org\", \"tags\": [\"Patch\"]}, {\"url\": \"https://github.com/the-tcpdump-group/libpcap/commit/8a633ee5b9ecd9d38a587ac9b204e2380713b0d6\", \"source\": \"security@tcpdump.org\", \"tags\": [\"Patch\"]}]",
      "sourceIdentifier": "security@tcpdump.org",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"security@tcpdump.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-476\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-8006\",\"sourceIdentifier\":\"security@tcpdump.org\",\"published\":\"2024-08-31T00:15:05.743\",\"lastModified\":\"2024-09-19T17:46:03.447\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.\"},{\"lang\":\"es\",\"value\":\"La compatibilidad con captura remota de paquetes est\u00e1 deshabilitada de forma predeterminada en libpcap. Cuando un usuario compila libpcap con la compatibilidad con captura remota de paquetes habilitada, una de las funciones que se vuelven disponibles es pcap_findalldevs_ex(). Uno de los argumentos de la funci\u00f3n puede ser una ruta del sistema de archivos, que normalmente significa un directorio con archivos de datos de entrada. Cuando la ruta especificada no se puede usar como directorio, la funci\u00f3n recibe NULL de opendir(), pero no verifica el valor de retorno y pasa el valor NULL a readdir(), lo que provoca una desreferencia del puntero NULL.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@tcpdump.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security@tcpdump.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tcpdump:libpcap:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.10.5\",\"matchCriteriaId\":\"83511DB8-7FA5-4C5D-8E9D-B6310A1006C4\"}]}]}],\"references\":[{\"url\":\"https://github.com/the-tcpdump-group/libpcap/commit/0f8a103469ce87d2b8d68c5130a46ddb7fb5eb29\",\"source\":\"security@tcpdump.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/the-tcpdump-group/libpcap/commit/8a633ee5b9ecd9d38a587ac9b204e2380713b0d6\",\"source\":\"security@tcpdump.org\",\"tags\":[\"Patch\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-8006\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-03T19:17:39.415802Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-03T19:17:45.961Z\"}}], \"cna\": {\"title\": \"NULL pointer dereference in libpcap before 1.10.5 with remote packet capture support\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Flavio Toffalini\"}, {\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Nicolas Badoux\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.4, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/the-tcpdump-group/libpcap/\", \"vendor\": \"The Tcpdump Group\", \"modules\": [\"remote packet capture\"], \"product\": \"libpcap\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.9.x\"}, {\"status\": \"affected\", \"version\": \"1.10.x\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"1.10.4\"}], \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"pcap_findalldevs_ex()\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"A functional exploit exists.\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Upgrade to libpcap 1.10.5.\"}], \"references\": [{\"url\": \"https://github.com/the-tcpdump-group/libpcap/commit/0f8a103469ce87d2b8d68c5130a46ddb7fb5eb29\", \"tags\": [\"patch\"]}, {\"url\": \"https://github.com/the-tcpdump-group/libpcap/commit/8a633ee5b9ecd9d38a587ac9b204e2380713b0d6\", \"tags\": [\"patch\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Do not build libpcap with remote packet capture support.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-476\", \"description\": \"CWE-476 NULL Pointer Dereference\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"The problem is specific to the remote packet capture code, which is not enabled in the default build configuration.\"}], \"providerMetadata\": {\"orgId\": \"cfdbb673-b408-4d03-89c1-c3d73ed80896\", \"shortName\": \"Tcpdump\", \"dateUpdated\": \"2024-08-30T23:53:11.334Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-8006\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-03T19:17:49.301Z\", \"dateReserved\": \"2024-08-20T09:58:58.455Z\", \"assignerOrgId\": \"cfdbb673-b408-4d03-89c1-c3d73ed80896\", \"datePublished\": \"2024-08-30T23:53:11.334Z\", \"assignerShortName\": \"Tcpdump\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…