Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-3843

Опубликовано: 28 мая 2021
Источник: debian
EPSS Низкий

Описание

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ettercapfixed1:0.7.4-1package

Примечания

  • Very far-fetched attack vector

EPSS

Процентиль: 17%
0.00054
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

CVSS3: 7.8
nvd
больше 4 лет назад

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

github
почти 4 года назад

The gtkui_conf_read function in src/interfaces/gtk/ec_gtk_conf.c in Ettercap 0.7.3, when the GTK interface is used, does not ensure that the contents of the .ettercap_gtk file are controlled by the root user, which allows local users to conduct stack-based buffer overflow attacks and possibly execute arbitrary code, cause a denial of service (memory consumption), or possibly have unspecified other impact via crafted lines in this file.

CVSS3: 7.8
fstec
больше 15 лет назад

Уязвимость функции gtkui_conf_read() компонента src/interfacesgtk/ec_gtk_conf.c инструмента защиты от MITM атак в LAN Ettercap, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 17%
0.00054
Низкий