pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
In libpcap 1.10.6 the function has been reimplemented to apply a stricter input validation and to fail safely if the input is invalid.
Workaround
No workaround given by the vendor.
References
History
Wed, 31 Dec 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer. | |
| Title | OOBR and OOBW in pcap_ether_aton() in libpcap | |
| Weaknesses | CWE-122 CWE-126 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Tcpdump
Published:
Updated: 2025-12-31T00:56:16.310Z
Reserved: 2025-10-20T13:42:36.190Z
Link: CVE-2025-11961
No data.
Status : Received
Published: 2025-12-31T01:15:54.500
Modified: 2025-12-31T01:15:54.500
Link: CVE-2025-11961
No data.
OpenCVE Enrichment
No data.