Lucene search

K
gentooGentoo FoundationGLSA-200506-07
HistoryJun 11, 2005 - 12:00 a.m.

Ettercap: Format string vulnerability

2005-06-1100:00:00
Gentoo Foundation
security.gentoo.org
11

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.107 Low

EPSS

Percentile

95.0%

Background

Ettercap is a suite of tools for content filtering, sniffing and man in the middle attacks on a LAN.

Description

The curses_msg function of Ettercap’s Ncurses-based user interface insecurely implements formatted printing.

Impact

A remote attacker could craft a malicious network flow that would result in executing arbitrary code with the rights of the user running the Ettercap tool, which is often root.

Workaround

There is no known workaround at this time.

Resolution

All Ettercap users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-analyzer/ettercap-0.7.3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-analyzer/ettercap< 0.7.3UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.107 Low

EPSS

Percentile

95.0%