Lucene search

K
freebsdFreeBSD1B9B199F-5EFD-11E2-A1EE-C48508086173
HistoryJan 07, 2013 - 12:00 a.m.

ettercap -- buffer overflow in target list parsing

2013-01-0700:00:00
vuxml.freebsd.org
19

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

5.1%

Host target list parsing routine in ettercap
0.7.4-series prior to 0.7.4.1 and 0.7.5-series
is prone to the stack-based buffer overflow that
may lead to the code execution with the privileges
of the ettercap process.
In order to trigger this vulnerability, user or service
that use ettercap should be tricked to pass the crafted list
of targets via the “-j” option.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchettercap< 0.7.4.1UNKNOWN

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

5.1%