CVE-2013-0722
Published: 11 January 2013
Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line.
Priority
Status
Package | Release | Status |
---|---|---|
ettercap Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was not-affected [1:0.8.0-11])
|
|
upstream |
Released
(1:0.7.5.1-2)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Not vulnerable
(1:0.8.2-2build1)
|
|
yakkety |
Not vulnerable
(1:0.8.2-2build1)
|
|
zesty |
Not vulnerable
|
References
- http://www.openwall.com/lists/oss-security/2013/01/10/2
- http://www.exploit-db.com/exploits/23945/
- https://secunia.com/advisories/51731/
- https://bugzilla.redhat.com/show_bug.cgi?id=894092
- https://bugs.gentoo.org/show_bug.cgi?id=451198
- http://www.securation.com/files/2013/01/ec.patch
- http://secunia.com/advisories/51731
- https://www.cve.org/CVERecord?id=CVE-2013-0722
- NVD
- Launchpad
- Debian