Vulnerability Name:

CVE-2019-15162 (CCN-168324)

Assigned:2019-10-02
Published:2019-10-02
Updated:2019-10-27
Summary:rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames.
CVSS v3 Severity:5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-345
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2019-15162

Source: FULLDISC
Type: UNKNOWN
20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra

Source: XF
Type: UNKNOWN
libpcap-cve201915162-info-disc(168324)

Source: CCN
Type: libpcap GIT Repository
libpcap

Source: CONFIRM
Type: Product, Release Notes
https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58

Source: FEDORA
Type: UNKNOWN
FEDORA-2019-eaa681d33e

Source: FEDORA
Type: UNKNOWN
FEDORA-2019-b92ce3144a

Source: FEDORA
Type: UNKNOWN
FEDORA-2019-4fe461079f

Source: BUGTRAQ
Type: UNKNOWN
20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra

Source: CCN
Type: Apple security document HT210788
About the security content of macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT210785

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT210788

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT210789

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT210790

Source: N/A
Type: UNKNOWN
N/A

Source: CONFIRM
Type: Vendor Advisory
https://www.tcpdump.org/public-cve-list.txt

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-15162

Vulnerable Configuration:Configuration 1:
  • cpe:/a:tcpdump:libpcap:*:*:*:*:*:*:*:* (Version < 1.9.1)
  • AND
  • cpe:/o:opengroup:unix:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:tcpdump:libpcap:1.9.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7639
    P
    libpcap-devel-1.10.1-150400.1.7 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:3053
    P
    dnsmasq-2.78-18.9.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94683
    P
    libpcap-devel-1.10.1-150400.1.7 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:176
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2022-06-13
    oval:org.opensuse.security:def:63490
    P
    libpcap1-32bit-1.9.1-1.33 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:2401
    P
    libpcap1-32bit-1.9.1-1.33 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:100952
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:71935
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:62194
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:1105
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2021-08-09
    oval:com.ubuntu.disco:def:2019151620000000
    V
    CVE-2019-15162 on Ubuntu 19.04 (disco) - medium.
    2019-10-03
    oval:com.ubuntu.bionic:def:2019151620000000
    V
    CVE-2019-15162 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-10-03
    oval:com.ubuntu.xenial:def:2019151620000000
    V
    CVE-2019-15162 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-10-03
    BACK
    tcpdump libpcap *
    opengroup unix -
    tcpdump libpcap 1.9.0