Your submission was sent successfully! Close

CVE-2010-3843

Published: 28 May 2021

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
ettercap
Launchpad, Ubuntu, Debian
Upstream
Released (1:0.7.4-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(1:0.8.0-11ubuntu0.3)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(1:0.8.0-11ubuntu0.3)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was not-affected [1:0.8.0-11ubuntu0.3])
Patches:
Upstream: https://github.com/drizztbsd/ettercap/commit/7f8a7a8cc18fd852c795f3f531d98ca8b58f5cbc