Description
The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.
References
https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347
https://bugzilla.redhat.com/show_bug.cgi?id=643453
https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347
https://bugzilla.redhat.com/show_bug.cgi?id=643453
CVSS impact metrics
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 · High
Information
Source identifier
Vulnerability status
Modified
Published
2021-05-28T11:15:07.283Z
4 years agoLast modified
2024-11-21T00:19:44.257Z
1 year ago