DNA View

CVE-2023-7256

Medium
Low Medium High Critical
4.4
CVSS Score
Published: Aug 31, 2024
Last Modified: Sep 19, 2024

Vulnerability Description

In affected libpcap versions during the setup of a remote packet capture the internal function sock_initaddress() calls getaddrinfo() and possibly freeaddrinfo(), but does not clearly indicate to the caller function whether freeaddrinfo() still remains to be called after the function returns. This makes it possible in some scenarios that both the function and its caller call freeaddrinfo() for the same allocated memory block. A similar problem was reported in Apple libpcap, to which Apple assigned CVE-2023-40400.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector
L
Attack Complexity
L
Privileges Required
H
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H

Known Affected Software

39 configuration(s) from 1 vendor(s)

libpcap
Version:
1.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.1:*:*:*:*:*:*:*
libpcap
Version:
1.10.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.0:*:*:*:*:*:*:*
libpcap
Version:
0.9.7
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.7:*:*:*:*:*:*:*
libpcap
Version:
1.5.2
CPE:
cpe:2.3:a:tcpdump:libpcap:1.5.2:*:*:*:*:*:*:*
libpcap
Version:
1.2.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.2.0:*:*:*:*:*:*:*
libpcap
Version:
0.8.1
CPE:
cpe:2.3:a:tcpdump:libpcap:0.8.1:*:*:*:*:*:*:*
libpcap
Version:
1.7.3
CPE:
cpe:2.3:a:tcpdump:libpcap:1.7.3:*:*:*:*:*:*:*
libpcap
Version:
0.9.5
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.5:*:*:*:*:*:*:*
libpcap
Version:
1.10.2
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.2:*:*:*:*:*:*:*
libpcap
Version:
1.0.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.0.0:*:*:*:*:*:*:*
libpcap
Version:
1.7.4
CPE:
cpe:2.3:a:tcpdump:libpcap:1.7.4:*:*:*:*:*:*:*
libpcap
Version:
1.9.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.9.1:*:*:*:*:*:*:*
libpcap
Version:
1.1.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.1.0:*:*:*:*:*:*:*
libpcap
Version:
1.4.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.4.0:*:*:*:*:*:*:*
libpcap
Version:
0.9.3
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.3:*:*:*:*:*:*:*
libpcap
Version:
1.6.2
CPE:
cpe:2.3:a:tcpdump:libpcap:1.6.2:*:*:*:*:*:*:*
libpcap
Version:
1.6.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.6.1:*:*:*:*:*:*:*
libpcap
Version:
0.9.4
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.4:*:*:*:*:*:*:*
libpcap
Version:
0.6.1
CPE:
cpe:2.3:a:tcpdump:libpcap:0.6.1:*:*:*:*:*:*:*
libpcap
Version:
0.7.2
CPE:
cpe:2.3:a:tcpdump:libpcap:0.7.2:*:*:*:*:*:*:*
libpcap
Version:
1.7.2
CPE:
cpe:2.3:a:tcpdump:libpcap:1.7.2:*:*:*:*:*:*:*
libpcap
Version:
1.1.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.1.1:*:*:*:*:*:*:*
libpcap
Version:
1.10.4
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.4:*:*:*:*:*:*:*
libpcap
Version:
1.8.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.8.1:*:*:*:*:*:*:*
libpcap
Version:
1.9.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.9.0:*:*:*:*:*:*:*
libpcap
Version:
0.9.1
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.1:*:*:*:*:*:*:*
libpcap
Version:
0.9.6
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.6:*:*:*:*:*:*:*
libpcap
Version:
1.10.3
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.3:*:*:*:*:*:*:*
libpcap
Version:
1.3.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.3.0:*:*:*:*:*:*:*
libpcap
Version:
1.2.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.2.1:*:*:*:*:*:*:*
libpcap
Version:
0.8.2
CPE:
cpe:2.3:a:tcpdump:libpcap:0.8.2:*:*:*:*:*:*:*
libpcap
Version:
1.5.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.5.1:*:*:*:*:*:*:*
libpcap
Version:
1.10.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.1:*:*:*:*:*:*:*
libpcap
Version:
0.5
CPE:
cpe:2.3:a:tcpdump:libpcap:0.5:*:*:*:*:*:*:*
libpcap
Version:
1.5.3
CPE:
cpe:2.3:a:tcpdump:libpcap:1.5.3:*:*:*:*:*:*:*
libpcap
Version:
0.7.1
CPE:
cpe:2.3:a:tcpdump:libpcap:0.7.1:*:*:*:*:*:*:*
libpcap
Version:
0.9.8
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.8:*:*:*:*:*:*:*
libpcap
Version:
0.8.3
CPE:
cpe:2.3:a:tcpdump:libpcap:0.8.3:*:*:*:*:*:*:*
libpcap
Version:
0.6.2
CPE:
cpe:2.3:a:tcpdump:libpcap:0.6.2:*:*:*:*:*:*:*
This vulnerability affects 39 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

4 patches available from vendors

View All Patches
Oracle

CPUOCT2025

Oracle Critical Patch Update Advisory - October 2025

Severity
Critical
Released
Oct 21, 2025
Restart Required
Security Update
Microsoft

2024-Nov-CVE-2023-7256

CVE-2023-7256: None

Severity
Unknown
Released
Sep 04, 2025
Security Update
Oracle

CPUJUL2025

Oracle Critical Patch Update Advisory - July 2025

Severity
Critical
Released
Jul 15, 2025
Restart Required
Security Update
Oracle

CPUJAN2025

Oracle Critical Patch Update Advisory - January 2025

Severity
Critical
Released
Jan 21, 2025
Restart Required
Security Update

Severity Details

4.4
out of 10.0
Medium

Weakness Type (CWE)

CWE-415

Double Free

Description
The product calls free() twice on the same memory address.
Exploit Likelihood
High
Typical Severity
Medium
Abstraction Level
Variant

Key Information

Published Date
August 31, 2024