DNA View

CVE-2024-8006

Medium
Low Medium High Critical
4.4
CVSS Score
Published: Aug 31, 2024
Last Modified: Sep 19, 2024

Vulnerability Description

Remote packet capture support is disabled by default in libpcap. When a user builds libpcap with remote packet capture support enabled, one of the functions that become available is pcap_findalldevs_ex(). One of the function arguments can be a filesystem path, which normally means a directory with input data files. When the specified path cannot be used as a directory, the function receives NULL from opendir(), but does not check the return value and passes the NULL value to readdir(), which causes a NULL pointer derefence.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector
L
Attack Complexity
L
Privileges Required
H
User Interaction
N
Scope
U
Confidentiality
N
Integrity
N
Availability
H

Known Affected Software

39 configuration(s) from 1 vendor(s)

libpcap
Version:
1.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.1:*:*:*:*:*:*:*
libpcap
Version:
1.10.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.0:*:*:*:*:*:*:*
libpcap
Version:
0.9.7
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.7:*:*:*:*:*:*:*
libpcap
Version:
1.5.2
CPE:
cpe:2.3:a:tcpdump:libpcap:1.5.2:*:*:*:*:*:*:*
libpcap
Version:
1.2.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.2.0:*:*:*:*:*:*:*
libpcap
Version:
0.8.1
CPE:
cpe:2.3:a:tcpdump:libpcap:0.8.1:*:*:*:*:*:*:*
libpcap
Version:
1.7.3
CPE:
cpe:2.3:a:tcpdump:libpcap:1.7.3:*:*:*:*:*:*:*
libpcap
Version:
0.9.5
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.5:*:*:*:*:*:*:*
libpcap
Version:
1.10.2
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.2:*:*:*:*:*:*:*
libpcap
Version:
1.0.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.0.0:*:*:*:*:*:*:*
libpcap
Version:
1.7.4
CPE:
cpe:2.3:a:tcpdump:libpcap:1.7.4:*:*:*:*:*:*:*
libpcap
Version:
1.9.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.9.1:*:*:*:*:*:*:*
libpcap
Version:
1.1.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.1.0:*:*:*:*:*:*:*
libpcap
Version:
1.4.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.4.0:*:*:*:*:*:*:*
libpcap
Version:
0.9.3
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.3:*:*:*:*:*:*:*
libpcap
Version:
1.6.2
CPE:
cpe:2.3:a:tcpdump:libpcap:1.6.2:*:*:*:*:*:*:*
libpcap
Version:
1.6.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.6.1:*:*:*:*:*:*:*
libpcap
Version:
0.9.4
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.4:*:*:*:*:*:*:*
libpcap
Version:
0.6.1
CPE:
cpe:2.3:a:tcpdump:libpcap:0.6.1:*:*:*:*:*:*:*
libpcap
Version:
0.7.2
CPE:
cpe:2.3:a:tcpdump:libpcap:0.7.2:*:*:*:*:*:*:*
libpcap
Version:
1.7.2
CPE:
cpe:2.3:a:tcpdump:libpcap:1.7.2:*:*:*:*:*:*:*
libpcap
Version:
1.1.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.1.1:*:*:*:*:*:*:*
libpcap
Version:
1.10.4
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.4:*:*:*:*:*:*:*
libpcap
Version:
1.8.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.8.1:*:*:*:*:*:*:*
libpcap
Version:
1.9.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.9.0:*:*:*:*:*:*:*
libpcap
Version:
0.9.1
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.1:*:*:*:*:*:*:*
libpcap
Version:
0.9.6
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.6:*:*:*:*:*:*:*
libpcap
Version:
1.10.3
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.3:*:*:*:*:*:*:*
libpcap
Version:
1.3.0
CPE:
cpe:2.3:a:tcpdump:libpcap:1.3.0:*:*:*:*:*:*:*
libpcap
Version:
1.2.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.2.1:*:*:*:*:*:*:*
libpcap
Version:
0.8.2
CPE:
cpe:2.3:a:tcpdump:libpcap:0.8.2:*:*:*:*:*:*:*
libpcap
Version:
1.5.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.5.1:*:*:*:*:*:*:*
libpcap
Version:
1.10.1
CPE:
cpe:2.3:a:tcpdump:libpcap:1.10.1:*:*:*:*:*:*:*
libpcap
Version:
0.5
CPE:
cpe:2.3:a:tcpdump:libpcap:0.5:*:*:*:*:*:*:*
libpcap
Version:
1.5.3
CPE:
cpe:2.3:a:tcpdump:libpcap:1.5.3:*:*:*:*:*:*:*
libpcap
Version:
0.7.1
CPE:
cpe:2.3:a:tcpdump:libpcap:0.7.1:*:*:*:*:*:*:*
libpcap
Version:
0.9.8
CPE:
cpe:2.3:a:tcpdump:libpcap:0.9.8:*:*:*:*:*:*:*
libpcap
Version:
0.8.3
CPE:
cpe:2.3:a:tcpdump:libpcap:0.8.3:*:*:*:*:*:*:*
libpcap
Version:
0.6.2
CPE:
cpe:2.3:a:tcpdump:libpcap:0.6.2:*:*:*:*:*:*:*
This vulnerability affects 39 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

4 patches available from vendors

View All Patches
Oracle

CPUOCT2025

Oracle Critical Patch Update Advisory - October 2025

Severity
Critical
Released
Oct 21, 2025
Restart Required
Security Update
Microsoft

2024-Nov-CVE-2024-8006

CVE-2024-8006: None

Severity
Unknown
Released
Sep 04, 2025
Security Update
Oracle

CPUJUL2025

Oracle Critical Patch Update Advisory - July 2025

Severity
Critical
Released
Jul 15, 2025
Restart Required
Security Update
Oracle

CPUJAN2025

Oracle Critical Patch Update Advisory - January 2025

Severity
Critical
Released
Jan 21, 2025
Restart Required
Security Update

Severity Details

4.4
out of 10.0
Medium

Weakness Type (CWE)

CWE-476 Top 25 #21

NULL Pointer Dereference

Description
The product dereferences a pointer that it expects to be valid but is NULL.
Exploit Likelihood
Medium
Typical Severity
High
Abstraction Level
Base

Key Information

Published Date
August 31, 2024