First published: Thu Jan 10 2013(Updated: )
A stack-based buffer overflow was reported [1],[2] in Ettercap <= 0.7.5.1. A boundary error within the scan_load_hosts() function (in src/ec_scan.c), when parsing entries from a hosts list, could be exploited to cause a stack-based buffer overflow via an overly long entry. In order to exploit this, a user must be tricked into loading a malicious host file. This has not yet been corrected upstream, but a proposed patch is available [3]. The initial report [1] indicates that this was given the name <a href="https://access.redhat.com/security/cve/CVE-2012-0722">CVE-2012-0722</a>. [1] <a href="http://www.exploit-db.com/exploits/23945/">http://www.exploit-db.com/exploits/23945/</a> [2] <a href="https://secunia.com/advisories/51731/">https://secunia.com/advisories/51731/</a> [3] <a href="http://www.securation.com/files/2013/01/ec.patch">http://www.securation.com/files/2013/01/ec.patch</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ettercap | <0.7.5.2 | 0.7.5.2 |
Ettercap | <=0.7.5.1 | |
Ettercap | =0.6.3.1 | |
Ettercap | =0.7.2 | |
Ettercap | =0.7.3 | |
Ettercap | =0.7.4 | |
Ettercap | =0.7.4.1 | |
Ettercap | =0.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.