First published: Thu Oct 03 2019(Updated: )
libpcap. Multiple issues were addressed by updating to libpcap version 1.9.1
Credit: CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump Libpcap | <1.9.1 | |
Apple tvOS | <13.3 | 13.3 |
Apple watchOS | <6.1.1 | 6.1.1 |
Apple iOS | <13.3 | 13.3 |
Apple iPadOS | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2019-15164.
CVE-2019-15164 has a severity rating of medium.
The affected software for CVE-2019-15164 includes libpcap version 1.9.1, Tcpdump Libpcap, Apple watchOS up to version 6.1.1, Apple tvOS up to version 13.3, Apple iOS up to version 13.3, and Apple iPadOS up to version 13.3.
CVE-2019-15164 is a vulnerability in libpcap before version 1.9.1 that allows SSRF (Server-Side Request Forgery) due to a URL provided as a capture source.
You can fix CVE-2019-15164 by updating to libpcap version 1.9.1.