CVE-2010-3843

The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.
Configurations

Configuration 1 (hide)

cpe:2.3:a:ettercap-project:ettercap:0.7.3:*:*:*:*:*:*:*

History

08 Jul 2021, 11:15

Type Values Removed Values Added
CWE CWE-787 CWE-120

22 Jun 2021, 13:15

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2010/10/14/1', 'name': 'http://www.openwall.com/lists/oss-security/2010/10/14/1', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://secunia.com/advisories/41820', 'name': 'http://secunia.com/advisories/41820', 'tags': ['Not Applicable'], 'refsource': 'MISC'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2010/10/13/2', 'name': 'http://www.openwall.com/lists/oss-security/2010/10/13/2', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2010/10/13/6', 'name': 'http://www.openwall.com/lists/oss-security/2010/10/13/6', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://www.openwall.com/lists/oss-security/2010/10/14/2', 'name': 'http://www.openwall.com/lists/oss-security/2010/10/14/2', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • (MISC) http://article.gmane.org/gmane.comp.security.oss.general/3660 -
Summary The gtkui_conf_read function in src/interfaces/gtk/ec_gtk_conf.c in Ettercap 0.7.3, when the GTK interface is used, does not ensure that the contents of the .ettercap_gtk file are controlled by the root user, which allows local users to conduct stack-based buffer overflow attacks and possibly execute arbitrary code, cause a denial of service (memory consumption), or possibly have unspecified other impact via crafted lines in this file. The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.

09 Jun 2021, 14:13

Type Values Removed Values Added
CWE CWE-787
References (MISC) http://secunia.com/advisories/41820 - (MISC) http://secunia.com/advisories/41820 - Not Applicable
References (MISC) http://www.openwall.com/lists/oss-security/2010/10/14/1 - (MISC) http://www.openwall.com/lists/oss-security/2010/10/14/1 - Mailing List, Third Party Advisory
References (MISC) https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347 - (MISC) https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347 - Patch, Third Party Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2010/10/14/2 - (MISC) http://www.openwall.com/lists/oss-security/2010/10/14/2 - Mailing List, Third Party Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2010/10/13/6 - (MISC) http://www.openwall.com/lists/oss-security/2010/10/13/6 - Mailing List, Third Party Advisory
References (MISC) http://www.openwall.com/lists/oss-security/2010/10/13/2 - (MISC) http://www.openwall.com/lists/oss-security/2010/10/13/2 - Mailing List, Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=643453 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=643453 - Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:ettercap-project:ettercap:0.7.3:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8

28 May 2021, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-28 13:15

Updated : 2024-02-04 21:47


NVD link : CVE-2010-3843

Mitre link : CVE-2010-3843

CVE.ORG link : CVE-2010-3843


JSON object : View

Products Affected

ettercap-project

  • ettercap
CWE
CWE-787

Out-of-bounds Write