Vulnerability Name:

CVE-2019-15163 (CCN-168323)

Assigned:2019-10-02
Published:2019-10-02
Updated:2019-10-27
Summary:rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-476
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2019-15163

Source: FULLDISC
Type: UNKNOWN
20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra

Source: XF
Type: UNKNOWN
libpcap-cve201915163-dos(168323)

Source: CCN
Type: libpcap GIT Repository
libpcap

Source: CONFIRM
Type: Third Party Advisory
https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES

Source: CONFIRM
Type: Patch, Third Party Advisory
https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31

Source: FEDORA
Type: UNKNOWN
FEDORA-2019-eaa681d33e

Source: FEDORA
Type: UNKNOWN
FEDORA-2019-b92ce3144a

Source: FEDORA
Type: UNKNOWN
FEDORA-2019-4fe461079f

Source: BUGTRAQ
Type: UNKNOWN
20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra

Source: CCN
Type: Apple security document HT210788
About the security content of macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT210785

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT210788

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT210789

Source: CONFIRM
Type: UNKNOWN
https://support.apple.com/kb/HT210790

Source: CONFIRM
Type: UNKNOWN
https://support.f5.com/csp/article/K92862401?utm_source=f5support&utm_medium=RSS

Source: CCN
Type: Oracle CPUApr2020
Oracle Critical Patch Update Advisory - April 2020

Source: N/A
Type: UNKNOWN
N/A

Source: CONFIRM
Type: Third Party Advisory
https://www.tcpdump.org/public-cve-list.txt

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-15163

Vulnerable Configuration:Configuration 1:
  • cpe:/a:tcpdump:libpcap:*:*:*:*:*:*:*:* (Version < 1.9.1)

  • Configuration CCN 1:
  • cpe:/a:tcpdump:libpcap:1.9.0:*:*:*:*:*:*:*
  • AND
  • cpe:/a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:7639
    P
    libpcap-devel-1.10.1-150400.1.7 on GA media (Moderate)
    2023-06-12
    oval:org.opensuse.security:def:3053
    P
    dnsmasq-2.78-18.9.1 on GA media (Moderate)
    2022-06-28
    oval:org.opensuse.security:def:94683
    P
    libpcap-devel-1.10.1-150400.1.7 on GA media (Moderate)
    2022-06-22
    oval:org.opensuse.security:def:176
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2022-06-13
    oval:org.opensuse.security:def:63490
    P
    libpcap1-32bit-1.9.1-1.33 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:2401
    P
    libpcap1-32bit-1.9.1-1.33 on GA media (Moderate)
    2021-08-10
    oval:org.opensuse.security:def:100952
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:71935
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:62194
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2021-08-09
    oval:org.opensuse.security:def:1105
    P
    libpcap-devel-1.9.1-1.33 on GA media (Moderate)
    2021-08-09
    oval:com.ubuntu.disco:def:2019151630000000
    V
    CVE-2019-15163 on Ubuntu 19.04 (disco) - medium.
    2019-10-03
    oval:com.ubuntu.bionic:def:2019151630000000
    V
    CVE-2019-15163 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-10-03
    oval:com.ubuntu.xenial:def:2019151630000000
    V
    CVE-2019-15163 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-10-03
    BACK
    tcpdump libpcap *
    tcpdump libpcap 1.9.0
    oracle communications operations monitor 3.4
    oracle communications operations monitor 4.0
    oracle communications operations monitor 4.1
    oracle communications operations monitor 4.2
    oracle communications operations monitor 4.3