LWN.net Logo

ettercap: code execution

Package(s):ettercap CVE #(s):CVE-2013-0722
Created:February 1, 2013 Updated:February 6, 2013
Description:

From the Red Hat bugzilla entry:

A stack-based buffer overflow was reported in Ettercap <= 0.7.5.1. A boundary error within the scan_load_hosts() function (in src/ec_scan.c), when parsing entries from a hosts list, could be exploited to cause a stack-based buffer overflow via an overly long entry. In order to exploit this, a user must be tricked into loading a malicious host file.

Alerts:
Fedora FEDORA-2013-0894 2013-02-01
Fedora FEDORA-2013-0899 2013-02-01
Fedora FEDORA-2013-1421 2013-02-02

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds