CVE-2019-15162

Name
CVE-2019-15162
Description
rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Product https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
Vendor Advisory https://www.tcpdump.org/public-cve-list.txt
Patch https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZTIPUWABYUE5KQOLCKAW65AUUSB7QO6/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P5K3DQ4TFSZBDB3XN4CZNJNQ3UIF3D3/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBIEKWLNIR62KZ5GA7EDXZS52HU6OE5F/
CONFIRM https://support.apple.com/kb/HT210788
BUGTRAQ https://seclists.org/bugtraq/2019/Dec/23
FULLDISC http://seclists.org/fulldisclosure/2019/Dec/26
CONFIRM https://support.apple.com/kb/HT210790
CONFIRM https://support.apple.com/kb/HT210789
CONFIRM https://support.apple.com/kb/HT210785
N/A https://www.oracle.com/security-alerts/cpuapr2020.html

Match rules

CPE URI Source package Min version Max version

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
libpcap edge-main 1.9.1-r0 None fixed
libpcap 3.22-main 1.9.1-r0 None fixed
libpcap 3.21-main 1.9.1-r0 None fixed
libpcap 3.20-main 1.9.1-r0 None fixed
libpcap 3.19-main 1.9.1-r0 None fixed
libpcap 3.18-main 1.9.1-r0 None fixed
libpcap 3.17-main 1.9.1-r0 None fixed
libpcap 3.12-main 1.9.1-r0 None fixed
libpcap 3.10-main 1.1.1-r0 None fixed