CVE-2019-1010142
Summary
| CVE | CVE-2019-1010142 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-07-19 16:15:00 UTC |
| Updated | 2023-11-07 03:02:00 UTC |
| Description | scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource consumption and program unresponsive. The component is: _RADIUSAttrPacketListField.getfield(self..). The attack vector is: over the network or in a pcap. both work. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Scapy '_RADIUSAttrPacketListField' Class Remote Denial of Service Vulnerability |
BID |
www.securityfocus.com |
|
| Remove useless _RADIUSAttrPacketListField class by p-l- · Pull Request #1409 · secdev/scapy · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| [SECURITY] Fedora 30 Update: scapy-2.4.3-1.fc30 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Scapy-sploit: Python Network Tool is Vulnerable to Denial of Service (DoS) Attack CVE pending | Imperva |
MISC |
www.imperva.com |
Exploit, Patch, Third Party Advisory |
| [SECURITY] Fedora 29 Update: scapy-2.4.3-2.fc29 - package-announce - Fedora Mailing-Lists |
|
lists.fedoraproject.org |
|
| Remove useless _RADIUSAttrPacketListField class by p-l- · Pull Request #1409 · secdev/scapy · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| [SECURITY] Fedora 29 Update: scapy-2.4.3-2.fc29 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 30 Update: scapy-2.4.3-1.fc30 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 982601 Python (pip) Security Update for scapy (GHSA-mpf2-q34c-fc6j)