{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-8006","assignerOrgId":"cfdbb673-b408-4d03-89c1-c3d73ed80896","state":"PUBLISHED","assignerShortName":"Tcpdump","dateReserved":"2024-08-20T09:58:58.455Z","datePublished":"2024-08-30T23:53:11.334Z","dateUpdated":"2024-09-03T19:17:49.301Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["remote packet capture"],"product":"libpcap","programRoutines":[{"name":"pcap_findalldevs_ex()"}],"repo":"https://github.com/the-tcpdump-group/libpcap/","vendor":"The Tcpdump Group","versions":[{"status":"affected","version":"1.9.x"},{"lessThanOrEqual":"1.10.4","status":"affected","version":"1.10.x","versionType":"semver"}]}],"configurations":[{"lang":"en","value":"The problem is specific to the remote packet capture code, which is not enabled in the default build configuration."}],"credits":[{"lang":"en","type":"finder","value":"Flavio Toffalini"},{"lang":"en","type":"reporter","value":"Nicolas Badoux"}],"descriptions":[{"lang":"en","value":"Remote packet capture support is disabled by default in libpcap.  When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex().  One of the function arguments can be a filesystem path, which normally means a directory with input data files.  When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence."}],"exploits":[{"lang":"en","value":"A functional exploit exists."}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseSeverity":"MEDIUM","baseScore":4.4,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-476","description":"CWE-476 NULL Pointer Dereference","lang":"en","type":"CWE"}]}],"references":[{"tags":["patch"],"url":"https://github.com/the-tcpdump-group/libpcap/commit/0f8a103469ce87d2b8d68c5130a46ddb7fb5eb29"},{"tags":["patch"],"url":"https://github.com/the-tcpdump-group/libpcap/commit/8a633ee5b9ecd9d38a587ac9b204e2380713b0d6"}],"solutions":[{"lang":"en","value":"Upgrade to libpcap 1.10.5."}],"source":{"discovery":"EXTERNAL"},"title":"NULL pointer dereference in libpcap before 1.10.5 with remote packet capture support","workarounds":[{"lang":"en","value":"Do not build libpcap with remote packet capture support."}],"providerMetadata":{"orgId":"cfdbb673-b408-4d03-89c1-c3d73ed80896","shortName":"Tcpdump","dateUpdated":"2024-08-30T23:53:11.334Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-03T19:17:39.415802Z","id":"CVE-2024-8006","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-03T19:17:49.301Z"}}]}}