Home / CVE DB / CVE-2023-7256
Standard
Vulnerability Identifier

CVE-2023-7256

2024-08-31
Severity Assessment
4.4
MEDIUM
CVSS v3.x Score
Clinical Analysis (Description)

In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
None
Confidentiality
None
Integrity
High
Availability
AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Weakness Classification

CWE-CWE-415

Affected Population

Affected Configurations

Total: 39 detected entries

Software List Scrollable
tc
libpcap
Vendor: tcpdump • v1.1
tc
libpcap
Vendor: tcpdump • v1.10.0
tc
libpcap
Vendor: tcpdump • v0.9.7
tc
libpcap
Vendor: tcpdump • v1.5.2
tc
libpcap
Vendor: tcpdump • v1.2.0
tc
libpcap
Vendor: tcpdump • v0.8.1
tc
libpcap
Vendor: tcpdump • v1.7.3
tc
libpcap
Vendor: tcpdump • v0.9.5
tc
libpcap
Vendor: tcpdump • v1.10.2
tc
libpcap
Vendor: tcpdump • v1.0.0
tc
libpcap
Vendor: tcpdump • v1.7.4
tc
libpcap
Vendor: tcpdump • v1.9.1
tc
libpcap
Vendor: tcpdump • v1.1.0
tc
libpcap
Vendor: tcpdump • v1.4.0
tc
libpcap
Vendor: tcpdump • v0.9.3
tc
libpcap
Vendor: tcpdump • v1.6.2
tc
libpcap
Vendor: tcpdump • v1.6.1
tc
libpcap
Vendor: tcpdump • v0.9.4
tc
libpcap
Vendor: tcpdump • v0.6.1
tc
libpcap
Vendor: tcpdump • v0.7.2
tc
libpcap
Vendor: tcpdump • v1.7.2
tc
libpcap
Vendor: tcpdump • v1.1.1
tc
libpcap
Vendor: tcpdump • v1.10.4
tc
libpcap
Vendor: tcpdump • v1.8.1
tc
libpcap
Vendor: tcpdump • v1.9.0
tc
libpcap
Vendor: tcpdump • v0.9.1
tc
libpcap
Vendor: tcpdump • v0.9.6
tc
libpcap
Vendor: tcpdump • v1.10.3
tc
libpcap
Vendor: tcpdump • v1.3.0
tc
libpcap
Vendor: tcpdump • v1.2.1
tc
libpcap
Vendor: tcpdump • v0.8.2
tc
libpcap
Vendor: tcpdump • v1.5.1
tc
libpcap
Vendor: tcpdump • v1.10.1
tc
libpcap
Vendor: tcpdump • v0.5
tc
libpcap
Vendor: tcpdump • v1.5.3
tc
libpcap
Vendor: tcpdump • v0.7.1
tc
libpcap
Vendor: tcpdump • v0.9.8
tc
libpcap
Vendor: tcpdump • v0.8.3
tc
libpcap
Vendor: tcpdump • v0.6.2
Timeline

Time Line

PUBLICATION
31 Aug 2024
MODIFICATION
19 Sep 2024
FIRST PATCH
21 Oct 2025
Impact Statistics

Key Metrics

CVSS Score
4.4
MEDIUM
Products
39
Affected
Patches
4
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.