Your submission was sent successfully! Close

CVE-2010-3843

Published: 28 May 2021

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
ettercap
Launchpad, Ubuntu, Debian
artful Ignored
(reached end-of-life)
bionic Not vulnerable
(1:0.8.0-11ubuntu0.3)
cosmic Not vulnerable
(1:0.8.0-11ubuntu0.3)
hardy Ignored
(reached end-of-life)
lucid Ignored
(reached end-of-life)
natty Ignored
(reached end-of-life)
oneiric Ignored
(reached end-of-life)
precise Does not exist
(precise was needs-triage)
quantal Ignored
(reached end-of-life)
raring Ignored
(reached end-of-life)
saucy Ignored
(reached end-of-life)
trusty Does not exist
(trusty was not-affected [1:0.8.0-11ubuntu0.3])
upstream
Released (1:0.7.4-1)
utopic Ignored
(reached end-of-life)
vivid Ignored
(reached end-of-life)
wily Ignored
(reached end-of-life)
xenial Not vulnerable
(1:0.8.0-11ubuntu0.3)
yakkety Ignored
(reached end-of-life)
zesty Ignored
(reached end-of-life)