First published: Thu Oct 03 2019(Updated: )
libpcap. Multiple issues were addressed by updating to libpcap version 1.9.1
Credit: CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump Libpcap | <1.9.1 | |
Opengroup Unix | ||
Apple tvOS | <13.3 | 13.3 |
Apple watchOS | <6.1.1 | 6.1.1 |
Apple iOS | <13.3 | 13.3 |
Apple iPadOS | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2019-15162.
The severity level of CVE-2019-15162 is medium, with a severity value of 5.3.
The affected software includes Tcpdump Libpcap version up to 1.9.1, Apple watchOS version up to 6.1.1, Apple tvOS version up to 13.3, Apple iOS version up to 13.3, and Apple iPadOS version up to 13.3.
CVE-2019-15162 is a vulnerability in libpcap before version 1.9.1 on non-Windows platforms, which may provide details about why authentication failed, making it easier for attackers to enumerate valid usernames.
To mitigate the vulnerability, update the affected software to the recommended versions: libpcap version 1.9.1 for Tcpdump Libpcap, watchOS version 6.1.1 or later, tvOS version 13.3 or later, iOS version 13.3 or later, and iPadOS version 13.3 or later.