The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2021-05-28T12:14:46

Updated: 2021-06-22T12:10:36

Reserved: 2010-10-08T00:00:00


Link: CVE-2010-3843

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2021-05-28T13:15:07.283

Modified: 2021-07-08T11:15:08.237


Link: CVE-2010-3843

JSON object: View

cve-icon Redhat Information

No data.

CWE