Page 2 of 8 results (0.003 seconds)

CVSS: 5.3EPSS: 3%CPEs: 2EXPL: 0

rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames. El archivo rpcapd/daemon.c en libpcap versiones anteriores a 1.9.1, en plataformas diferentes de Windows proporciona detalles sobre por qué falló la autenticación, lo que podría hacer más fácil para que atacantes enumeren nombres de usuario válidos. • http://seclists.org/fulldisclosure/2019/Dec/26 https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org • CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 5.3EPSS: 3%CPEs: 1EXPL: 0

rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request. El archivo rpcapd/daemon.c en libpcap versiones anteriores a 1.9.1, maneja inapropiadamente ciertos valores de longitud debido a la reutilización de una variable. Esto puede abrir un vector de ataque involucrando datos adicionales al final de una petición. • http://seclists.org/fulldisclosure/2019/Dec/26 https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES https://github.com/the-tcpdump-group/libpcap/commit/617b12c0339db4891d117b661982126c495439ea https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org • CWE-131: Incorrect Calculation of Buffer Size •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets. pcap-linux.c en libpcap 1.1.1 antes del commit con ID ea9432fabdf4b33cbc76d9437200e028f1c47c93, cuando snaplen está establecido puede truncar paquetes, lo que podría permitir que atacantes remotos envíen datos arbitrarios evitando la detección mediante paquetes manipulados • http://article.gmane.org/gmane.network.tcpdump.devel/4968 http://thread.gmane.org/gmane.network.tcpdump.devel/5018 http://www.openwall.com/lists/oss-security/2011/05/19/11 http://www.openwall.com/lists/oss-security/2014/02/08/5 https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1%3Bbug=623868%3Bfilename=0001-Fix-the-calculation-of-the-frame-size-in-memory-mapp.patch%3Bmsg=10 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=623868 https://security-tracker.debian.org/tracker •