Home / CVE DB / CVE-2024-8006
Standard
Vulnerability Identifier

CVE-2024-8006

2024-08-31
Severity Assessment
4.4
MEDIUM
CVSS v3.x Score
Clinical Analysis (Description)

Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Impact Consequences

Technical Impact

Unchanged
Scope
None
Confidentiality
None
Integrity
High
Availability
AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Weakness Classification

CWE-CWE-476

Affected Population

Affected Configurations

Total: 39 detected entries

Software List Scrollable
tc
libpcap
Vendor: tcpdump • v1.1
tc
libpcap
Vendor: tcpdump • v1.10.0
tc
libpcap
Vendor: tcpdump • v0.9.7
tc
libpcap
Vendor: tcpdump • v1.5.2
tc
libpcap
Vendor: tcpdump • v1.2.0
tc
libpcap
Vendor: tcpdump • v0.8.1
tc
libpcap
Vendor: tcpdump • v1.7.3
tc
libpcap
Vendor: tcpdump • v0.9.5
tc
libpcap
Vendor: tcpdump • v1.10.2
tc
libpcap
Vendor: tcpdump • v1.0.0
tc
libpcap
Vendor: tcpdump • v1.7.4
tc
libpcap
Vendor: tcpdump • v1.9.1
tc
libpcap
Vendor: tcpdump • v1.1.0
tc
libpcap
Vendor: tcpdump • v1.4.0
tc
libpcap
Vendor: tcpdump • v0.9.3
tc
libpcap
Vendor: tcpdump • v1.6.2
tc
libpcap
Vendor: tcpdump • v1.6.1
tc
libpcap
Vendor: tcpdump • v0.9.4
tc
libpcap
Vendor: tcpdump • v0.6.1
tc
libpcap
Vendor: tcpdump • v0.7.2
tc
libpcap
Vendor: tcpdump • v1.7.2
tc
libpcap
Vendor: tcpdump • v1.1.1
tc
libpcap
Vendor: tcpdump • v1.10.4
tc
libpcap
Vendor: tcpdump • v1.8.1
tc
libpcap
Vendor: tcpdump • v1.9.0
tc
libpcap
Vendor: tcpdump • v0.9.1
tc
libpcap
Vendor: tcpdump • v0.9.6
tc
libpcap
Vendor: tcpdump • v1.10.3
tc
libpcap
Vendor: tcpdump • v1.3.0
tc
libpcap
Vendor: tcpdump • v1.2.1
tc
libpcap
Vendor: tcpdump • v0.8.2
tc
libpcap
Vendor: tcpdump • v1.5.1
tc
libpcap
Vendor: tcpdump • v1.10.1
tc
libpcap
Vendor: tcpdump • v0.5
tc
libpcap
Vendor: tcpdump • v1.5.3
tc
libpcap
Vendor: tcpdump • v0.7.1
tc
libpcap
Vendor: tcpdump • v0.9.8
tc
libpcap
Vendor: tcpdump • v0.8.3
tc
libpcap
Vendor: tcpdump • v0.6.2
Timeline

Time Line

PUBLICATION
31 Aug 2024
MODIFICATION
19 Sep 2024
FIRST PATCH
21 Oct 2025
Impact Statistics

Key Metrics

CVSS Score
4.4
MEDIUM
Products
39
Affected
Patches
4
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.