{"id":"PYSEC-2019-120","details":"scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource consumption and program unresponsive. The component is: _RADIUSAttrPacketListField.getfield(self..). The attack vector is: over the network or in a pcap. both work.","aliases":["CVE-2019-1010142","GHSA-mpf2-q34c-fc6j"],"modified":"2023-11-08T04:00:40.784299Z","published":"2019-07-19T16:15:00Z","references":[{"type":"WEB","url":"https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058"},{"type":"WEB","url":"https://github.com/secdev/scapy/pull/1409"},{"type":"ARTICLE","url":"https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/"},{"type":"WEB","url":"http://www.securityfocus.com/bid/106674"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-mpf2-q34c-fc6j"}],"affected":[{"package":{"name":"scapy","ecosystem":"PyPI","purl":"pkg:pypi/scapy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.1"}]}],"versions":["2.2.0-dev","2.3.1","2.3.2","2.3.3","2.4rc2","2.4.0rc3","2.4.0rc4","2.4.0rc5","2.4.0"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/scapy/PYSEC-2019-120.yaml"}}],"schema_version":"1.7.3"}