scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource consumption and program unresponsive. The component is: _RADIUSAttrPacketListField.getfield(self..). The attack vector is: over the network or in a pcap. both work.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106674 | Broken Link Third Party Advisory VDB Entry |
https://github.com/secdev/scapy/pull/1409 | Patch Third Party Advisory |
https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/ | |
https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/ | Exploit Patch Third Party Advisory |
Configurations
History
07 Nov 2023, 03:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-07-19 16:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-1010142
Mitre link : CVE-2019-1010142
CVE.ORG link : CVE-2019-1010142
JSON object : View
Products Affected
scapy
- scapy
fedoraproject
- fedora
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')