CVE-2024-8006
MediumVulnerability Description
Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Known Affected Software
39 configuration(s) from 1 vendor(s)
cpe:2.3:a:tcpdump:libpcap:1.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.10.0:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.9.7:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.10.2:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.10.4:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.10.3:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.10.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.5:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:tcpdump:libpcap:0.6.2:*:*:*:*:*:*:*
CPUOCT2025
Oracle Critical Patch Update Advisory - October 2025
2024-Nov-CVE-2024-8006
CVE-2024-8006: None
CPUJUL2025
Oracle Critical Patch Update Advisory - July 2025
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
Severity Details
Weakness Type (CWE)
NULL Pointer Dereference
- Description
- The product dereferences a pointer that it expects to be valid but is NULL.
- Exploit Likelihood
- Medium
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- August 31, 2024
