src icon indicating copy to clipboard operation
src copied to clipboard

CVE-2024-8006 (Medium) detected in src3.2.3, src3.2.3

Open mend-bolt-for-github[bot] opened this issue 1 year ago • 17 comments

CVE-2024-8006 - Medium Severity Vulnerability

Vulnerable Libraries - src3.2.3, src3.2.3

src3.2.3

MidnightBSD OS source code

Library home page: https://github.com/MidnightBSD/src.git

Vulnerable Source Files (1)

/contrib/libpcap/pcap-new.c

src3.2.3

MidnightBSD OS source code

Library home page: https://github.com/MidnightBSD/src.git

Vulnerable Source Files (1)

/contrib/libpcap/pcap-new.c

Found in base branch: stable/3.2

Vulnerability Details

Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.

Publish Date: 2024-08-30

URL: CVE-2024-8006

CVSS 3 Score Details (4.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: None
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-8006

Release Date: 2024-08-30

Fix Resolution: libpcap-1.10.5


Step up your Open Source Security Game with Mend here