Описание
An unchecked sscanf() call in ettercap before 0.7.5 allows an insecure temporary settings file to overflow a static-sized buffer on the stack.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 1:0.8.0-11ubuntu0.3 |
| cosmic | not-affected | 1:0.8.0-11ubuntu0.3 |
| devel | not-affected | 1:0.8.0-11ubuntu0.3 |
| esm-apps/bionic | not-affected | 1:0.8.0-11ubuntu0.3 |
| esm-apps/xenial | not-affected | 1:0.8.0-11ubuntu0.3 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [1:0.8.0-11ubuntu0.3]] |
| hardy | ignored | end of life |
| lucid | ignored | end of life |
| natty | ignored | end of life |
Показывать по
10
Ссылки на источники
6.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
nvd
около 6 лет назад
An unchecked sscanf() call in ettercap before 0.7.5 allows an insecure temporary settings file to overflow a static-sized buffer on the stack.
CVSS3: 8.8
debian
около 6 лет назад
An unchecked sscanf() call in ettercap before 0.7.5 allows an insecure ...
github
почти 4 года назад
An unchecked sscanf() call in ettercap 0.7.3 allows an insecure temporary settings file to overflow a static-sized buffer on the stack.
6.8 Medium
CVSS2
8.8 High
CVSS3