Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0722

Опубликовано: 11 янв. 2013
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ettercapfixed1:0.7.5.1-2package
ettercapfixed1:0.7.3-2.1+squeeze1squeezepackage

Примечания

  • https://www.openwall.com/lists/oss-security/2013/01/10/2

  • http://www.exploit-db.com/exploits/23945/

  • https://secunia.com/advisories/51731/

  • Proposed patch http://www.securation.com/files/2013/01/ec.patch

EPSS

Процентиль: 38%
0.00169
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line.

nvd
около 13 лет назад

Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line.

github
больше 3 лет назад

Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line.

EPSS

Процентиль: 38%
0.00169
Низкий