First published: Thu Oct 03 2019(Updated: )
libpcap. Multiple issues were addressed by updating to libpcap version 1.9.1
Credit: CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <13.3 | 13.3 |
Apple iPadOS | <13.3 | 13.3 |
tcpdump | <1.9.1 | |
watchOS | <6.1.1 | 6.1.1 |
tvOS | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-15161 is a vulnerability in libpcap that mishandles certain length values and may allow an attack vector involving extra data at the end of a request.
The severity of CVE-2019-15161 is medium with a CVSS score of 5.3.
Tcpdump Libpcap version up to exclusive 1.9.1, Apple watchOS up to exclusive 6.1.1, Apple tvOS up to exclusive 13.3, Apple iOS up to exclusive 13.3, and Apple iPadOS up to exclusive 13.3 are affected by CVE-2019-15161.
To fix CVE-2019-15161, update to libpcap version 1.9.1 and apply the necessary updates for affected Apple devices.
You can find more information about CVE-2019-15161 in the references provided: [link1], [link2], [link3].