|
|
| |
|
| |
ettercap: code execution
| Package(s): | ettercap |
CVE #(s): | CVE-2013-0722
|
| Created: | February 1, 2013 |
Updated: | February 6, 2013 |
| Description: |
From the Red Hat bugzilla entry:
A stack-based buffer overflow was reported in Ettercap <= 0.7.5.1. A boundary error within the scan_load_hosts() function (in src/ec_scan.c), when parsing entries from a hosts list, could be exploited to cause a stack-based buffer overflow via an overly long entry. In order to exploit this, a user must be tricked into loading a malicious host file. |
| Alerts: |
|
( Log in to post comments)
|
|
|