The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.
References
Link | Resource |
---|---|
http://article.gmane.org/gmane.comp.security.oss.general/3660 | |
https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=643453 | Issue Tracking Third Party Advisory |
http://article.gmane.org/gmane.comp.security.oss.general/3660 | |
https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=643453 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-05-28 13:15
Updated : 2024-11-21 01:19
NVD link : CVE-2010-3843
Mitre link : CVE-2010-3843
CVE.ORG link : CVE-2010-3843
JSON object : View
Products Affected
ettercap-project
- ettercap
CWE
CWE-787
Out-of-bounds Write