First published: Fri Dec 19 2014(Updated: )
The radius_get_attribute function in dissectors/ec_radius.c in Ettercap 0.8.1 performs an incorrect cast, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which triggers a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ettercap | =0.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-9379 is considered critical due to its potential to cause remote denial of service or arbitrary code execution.
To fix CVE-2014-9379, upgrade to a version of Ettercap that addresses the vulnerability as provided by the project's maintainers.
CVE-2014-9379 affects Ettercap version 0.8.1 specifically.
CVE-2014-9379 is a stack-based buffer overflow vulnerability.
Yes, CVE-2014-9379 can lead to remote code execution due to an incorrect cast in the radius_get_attribute function.