|
|
Subscribe / Log in / New account

Mageia alert MGASA-2015-0012 (ettercap)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0012: Updated ettercap packages fix security vulnerabilities
Date:  Wed, 7 Jan 2015 17:32:35 +0100
Message-ID:  <20150107163235.312AC41499@valstar.mageia.org>

MGASA-2015-0012 - Updated ettercap packages fix security vulnerabilities Publication date: 07 Jan 2015 URL: http://advisories.mageia.org/MGASA-2015-0012.html Type: security Affected Mageia releases: 4 CVE: CVE-2014-6395, CVE-2014-6396, CVE-2014-9376, CVE-2014-9377, CVE-2014-9378, CVE-2014-9379, CVE-2014-9380, CVE-2014-9381 Description: Updated ettercap package fixes security vulnerabilities: Heap-based buffer overflow in the dissector_postgresql function in dissectors/ec_postgresql.c in Ettercap before 8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted password length value that is inconsistent with the actual length of the password (CVE-2014-6395). The dissector_postgresql function in dissectors/ec_postgresql.c in Ettercap before 8.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted password length, which triggers a 0 character to be written to an arbitrary memory location (CVE-2014-6396). Integer underflow in Ettercap 8.1 allows remote attackers to cause a denial of service (out-of-bounds write) and possibly execute arbitrary code via a small size variable value in the dissector_dhcp function in dissectors/ec_dhcp.c, length value to the dissector_gg function in dissectors/ec_gg.c, or string length to the get_decode_len function in ec_utils.c or a request without a username or password to the dissector_TN3270 function in dissectors/ec_TN3270.c (CVE-2014-9376). Heap-based buffer overflow in the nbns_spoof function in plug-ins/nbns_spoof/nbns_spoof.c in Ettercap 8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a large netbios packet (CVE-2014-9377). Ettercap 8.1 does not validate certain return values, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted name to the parse_line function in mdns_spoof/mdns_spoof.c or base64 encoded password to the dissector_imap function in dissectors/ec_imap.c (CVE-2014-9378). The radius_get_attribute function in dissectors/ec_radius.c in Ettercap 8.1 performs an incorrect cast, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which triggers a stack-based buffer overflow (CVE-2014-9379). The dissector_cvs function in dissectors/ec_cvs.c in Ettercap 8.1 allows remote attackers to cause a denial of service (out-of-bounds read) via a packet containing only a CVS_LOGIN signature (CVE-2014-9380). Integer signedness error in the dissector_cvs function in dissectors/ec_cvs.c in Ettercap 8.1 allows remote attackers to cause a denial of service (crash) via a crafted password, which triggers a large memory allocation (CVE-2014-9381). References: - https://bugs.mageia.org/show_bug.cgi?id=14919 - https://www.obrela.com/home/security-labs/advisories/osi-... - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6395 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6396 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9376 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9377 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9378 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9379 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9380 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9381 SRPMS: - 4/core/ettercap-0.8.0-3.1.mga4


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds