Vulnerability Description
pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented. If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.
CVSS Score
LOW
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-11961?
CVE-2025-11961 is a vulnerability with a CVSS score of 1.9 (LOW). pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer. The string argument must be a well-formed MAC-48 address in one of the sup...
How severe is CVE-2025-11961?
CVE-2025-11961 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11961?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.