Filtered by vendor Ettercap-project
Subscribe
Total
12 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2017-6430 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 4.3 MEDIUM | 5.5 MEDIUM |
The compile_tree function in ef_compiler.c in the Etterfilter utility in Ettercap 0.8.2 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted filter. | |||||
CVE-2014-9381 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 5.0 MEDIUM | N/A |
Integer signedness error in the dissector_cvs function in dissectors/ec_cvs.c in Ettercap 0.8.1 allows remote attackers to cause a denial of service (crash) via a crafted password, which triggers a large memory allocation. | |||||
CVE-2014-9380 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 5.0 MEDIUM | N/A |
The dissector_cvs function in dissectors/ec_cvs.c in Ettercap 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds read) via a packet containing only a CVS_LOGIN signature. | |||||
CVE-2014-9379 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 7.5 HIGH | N/A |
The radius_get_attribute function in dissectors/ec_radius.c in Ettercap 0.8.1 performs an incorrect cast, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which triggers a stack-based buffer overflow. | |||||
CVE-2014-9378 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 7.5 HIGH | N/A |
Ettercap 0.8.1 does not validate certain return values, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted (1) name to the parse_line function in mdns_spoof/mdns_spoof.c or (2) base64 encoded password to the dissector_imap function in dissectors/ec_imap.c. | |||||
CVE-2014-9377 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 7.5 HIGH | N/A |
Heap-based buffer overflow in the nbns_spoof function in plug-ins/nbns_spoof/nbns_spoof.c in Ettercap 0.8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a large netbios packet. | |||||
CVE-2014-9376 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 7.5 HIGH | N/A |
Integer underflow in Ettercap 0.8.1 allows remote attackers to cause a denial of service (out-of-bounds write) and possibly execute arbitrary code via a small (1) size variable value in the dissector_dhcp function in dissectors/ec_dhcp.c, (2) length value to the dissector_gg function in dissectors/ec_gg.c, or (3) string length to the get_decode_len function in ec_utils.c or a request without a (4) username or (5) password to the dissector_TN3270 function in dissectors/ec_TN3270.c. | |||||
CVE-2014-6396 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 7.5 HIGH | N/A |
The dissector_postgresql function in dissectors/ec_postgresql.c in Ettercap before 0.8.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted password length, which triggers a 0 character to be written to an arbitrary memory location. | |||||
CVE-2014-6395 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 7.5 HIGH | N/A |
Heap-based buffer overflow in the dissector_postgresql function in dissectors/ec_postgresql.c in Ettercap before 0.8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted password length value that is inconsistent with the actual length of the password. | |||||
CVE-2013-0722 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 4.4 MEDIUM | N/A |
Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line. | |||||
CVE-2010-3844 | 2 Debian, Ettercap-project | 2 Debian Linux, Ettercap | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
An unchecked sscanf() call in ettercap before 0.7.5 allows an insecure temporary settings file to overflow a static-sized buffer on the stack. | |||||
CVE-2010-3843 | 1 Ettercap-project | 1 Ettercap | 2024-11-21 | 4.6 MEDIUM | 7.8 HIGH |
The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack. |