{"containers":{"cna":{"affected":[{"product":"scapy","vendor":"SecDev","versions":[{"status":"affected","version":"2.4.0"}]}],"descriptions":[{"lang":"en","value":"scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource consumption and program unresponsive. The component is: _RADIUSAttrPacketListField.getfield(self..). The attack vector is: over the network or in a pcap. both work."}],"problemTypes":[{"descriptions":[{"description":"Denial of Service","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-10-21T00:05:06.000Z","orgId":"7556d962-6fb7-411e-85fa-6cd62f095ba8","shortName":"dwf"},"references":[{"tags":["x_refsource_MISC"],"url":"https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058"},{"tags":["x_refsource_MISC"],"url":"https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/"},{"tags":["x_refsource_MISC"],"url":"https://github.com/secdev/scapy/pull/1409"},{"name":"106674","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/106674"},{"name":"FEDORA-2019-47946eb312","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/"},{"name":"FEDORA-2019-d49c8ec32b","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve-assign@distributedweaknessfiling.org","ID":"CVE-2019-1010142","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"scapy","version":{"version_data":[{"version_value":"2.4.0"}]}}]},"vendor_name":"SecDev"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource consumption and program unresponsive. The component is: _RADIUSAttrPacketListField.getfield(self..). The attack vector is: over the network or in a pcap. both work."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Denial of Service"}]}]},"references":{"reference_data":[{"name":"https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058","refsource":"MISC","url":"https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058"},{"name":"https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/","refsource":"MISC","url":"https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/"},{"name":"https://github.com/secdev/scapy/pull/1409","refsource":"MISC","url":"https://github.com/secdev/scapy/pull/1409"},{"name":"106674","refsource":"BID","url":"http://www.securityfocus.com/bid/106674"},{"name":"FEDORA-2019-47946eb312","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/"},{"name":"FEDORA-2019-d49c8ec32b","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T03:07:18.093Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/secdev/scapy/pull/1409"},{"name":"106674","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/106674"},{"name":"FEDORA-2019-47946eb312","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/"},{"name":"FEDORA-2019-d49c8ec32b","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/"}]}]},"cveMetadata":{"assignerOrgId":"7556d962-6fb7-411e-85fa-6cd62f095ba8","assignerShortName":"dwf","cveId":"CVE-2019-1010142","datePublished":"2019-07-19T15:45:09.000Z","dateReserved":"2019-03-20T00:00:00.000Z","dateUpdated":"2024-08-05T03:07:18.093Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}