CVE-2019-15165
MEDIUMlibpcap < 1.9.1 - Denial of Service via Invalid PHB Header Length
Title source: llmDescription
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
References (20)
Core 20
Core References
Vendor Advisory x_refsource_confirm
https://www.tcpdump.org/public-cve-list.txt
Product, Release Notes x_refsource_confirm
https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
Patch, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
Patch, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00052.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00051.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/10/msg00031.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UZTIPUWABYUE5KQOLCKAW65AUUSB7QO6/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F/
Third Party Advisory x_refsource_confirm
https://support.apple.com/kb/HT210788
Third Party Advisory x_refsource_confirm
https://support.apple.com/kb/HT210790
Third Party Advisory x_refsource_confirm
https://support.apple.com/kb/HT210785
Third Party Advisory x_refsource_confirm
https://support.apple.com/kb/HT210789
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4221-1/
Mailing List, Third Party Advisory mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Dec/23
Issue Tracking, Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Dec/26
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4221-2/
Third Party Advisory x_refsource_misc
https://www.oracle.com/security-alerts/cpuapr2020.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/12/msg00014.html
Scores
CVSS v3
5.3
EPSS
0.0103
EPSS Percentile
77.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-770
Status
published
Products (26)
apple/ipados
13.3
apple/iphone_os
13.3
apple/mac_os_x
10.13.6 security_update_2019-007
apple/mac_os_x
10.14.6 security_update_2019-002
apple/mac_os_x
10.15.2
apple/mac_os_x
10.13 - 10.13.6
apple/tvos
13.3
apple/watchos
6.1.1
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
... and 16 more
Published
Oct 03, 2019
Tracked Since
Feb 18, 2026