CVE-2010-3843

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ettercap-project:ettercap:0.7.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://article.gmane.org/gmane.comp.security.oss.general/3660 - () http://article.gmane.org/gmane.comp.security.oss.general/3660 -
References () https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347 - Patch, Third Party Advisory () https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347 - Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=643453 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=643453 - Issue Tracking, Third Party Advisory

Information

Published : 2021-05-28 13:15

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3843

Mitre link : CVE-2010-3843

CVE.ORG link : CVE-2010-3843


JSON object : View

Products Affected

ettercap-project

  • ettercap
CWE
CWE-787

Out-of-bounds Write