The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2021-05-28T12:14:46
Updated: 2024-08-07T03:26:12.157Z
Reserved: 2010-10-08T00:00:00
Link: CVE-2010-3843
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-05-28T13:15:07.283
Modified: 2024-11-21T01:19:44.257
Link: CVE-2010-3843
Redhat
No data.