Buffer Overflow Affecting ettercap package, versions <1:0.7.4-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.05% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-ETTERCAP-528074
  • published27 Jun 2018
  • disclosed28 May 2021

Introduced: 27 Jun 2018

CVE-2010-3843  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade Debian:11 ettercap to version 1:0.7.4-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ettercap package and not the ettercap package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

CVSS Scores

version 3.1