Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2w85-hj5c-563j

Опубликовано: 21 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The gtkui_conf_read function in src/interfaces/gtk/ec_gtk_conf.c in Ettercap 0.7.3, when the GTK interface is used, does not ensure that the contents of the .ettercap_gtk file are controlled by the root user, which allows local users to conduct stack-based buffer overflow attacks and possibly execute arbitrary code, cause a denial of service (memory consumption), or possibly have unspecified other impact via crafted lines in this file.

The gtkui_conf_read function in src/interfaces/gtk/ec_gtk_conf.c in Ettercap 0.7.3, when the GTK interface is used, does not ensure that the contents of the .ettercap_gtk file are controlled by the root user, which allows local users to conduct stack-based buffer overflow attacks and possibly execute arbitrary code, cause a denial of service (memory consumption), or possibly have unspecified other impact via crafted lines in this file.

EPSS

Процентиль: 17%
0.00054
Низкий

Дефекты

CWE-120
CWE-787

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 4 лет назад

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

CVSS3: 7.8
nvd
больше 4 лет назад

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

CVSS3: 7.8
debian
больше 4 лет назад

The GTK version of ettercap uses a global settings file at /tmp/.etter ...

CVSS3: 7.8
fstec
больше 15 лет назад

Уязвимость функции gtkui_conf_read() компонента src/interfacesgtk/ec_gtk_conf.c инструмента защиты от MITM атак в LAN Ettercap, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 17%
0.00054
Низкий

Дефекты

CWE-120
CWE-787