scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource consumption and program unresponsive. The component is: _RADIUSAttrPacketListField.getfield(self..). The attack vector is: over the network or in a pcap. both work.
References
Link | Resource |
---|---|
https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058 | Patch Third Party Advisory |
https://github.com/secdev/scapy/pull/1409 | Patch Third Party Advisory |
https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/ | Exploit Patch Third Party Advisory |
http://www.securityfocus.com/bid/106674 | Broken Link Third Party Advisory VDB Entry |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/ | Mailing List Third Party Advisory |
Information
Published : 2019-07-19 09:15
Updated : 2023-03-01 08:39
NVD link : CVE-2019-1010142
Mitre link : CVE-2019-1010142
JSON object : View
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
Products Affected
fedoraproject
- fedora
scapy
- scapy