pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.
Advisories

No advisories yet.

Fixes

Solution

In libpcap 1.10.6 the function has been reimplemented to apply a stricter input validation and to fail safely if the input is invalid.


Workaround

No workaround given by the vendor.

History

Wed, 31 Dec 2025 01:15:00 +0000

Type Values Removed Values Added
Description pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.
Title OOBR and OOBW in pcap_ether_aton() in libpcap
Weaknesses CWE-122
CWE-126
References
Metrics cvssV3_1

{'score': 1.9, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Tcpdump

Published:

Updated: 2025-12-31T00:56:16.310Z

Reserved: 2025-10-20T13:42:36.190Z

Link: CVE-2025-11961

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-31T01:15:54.500

Modified: 2025-12-31T01:15:54.500

Link: CVE-2025-11961

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses