In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.
History

Thu, 19 Sep 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Tcpdump
Tcpdump libpcap
CPEs cpe:2.3:a:tcpdump:libpcap:*:*:*:*:*:*:*:*
Vendors & Products Tcpdump
Tcpdump libpcap

Tue, 03 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Sep 2024 11:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 30 Aug 2024 23:45:00 +0000

Type Values Removed Values Added
Description In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.
Title Double-free in libpcap before 1.10.5 with remote packet capture support.
Weaknesses CWE-415
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Tcpdump

Published: 2024-08-30T23:44:04.383Z

Updated: 2024-09-03T20:07:34.599Z

Reserved: 2024-04-11T15:02:51.577Z

Link: CVE-2023-7256

cve-icon Vulnrichment

Updated: 2024-09-03T20:07:15.451Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-31T00:15:05.240

Modified: 2024-09-19T17:53:15.207

Link: CVE-2023-7256

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-08-31T00:15:05Z

Links: CVE-2023-7256 - Bugzilla