Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit
prior to 0.3.7 via a crafted configuration file that will bypass
Non-eXecutable bit NX, stack smashing protector SSP, and address space
layout randomization ASLR protection mechanisms, which could let a
malicious user execute arbitrary code.
sbeattiesniffit is not setuid, so this issue only affects
configurations where a user is only permitted to run a subset of
administrative (e.g. using a sudo configuration that only allows a
user to run sniffit).
Upstream:released (0.3.7.beta-20)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [0.3.7.beta-17+deb8u1build0.14.04.1])
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (0.3.7.beta-20)
Ubuntu 19.10 (Eoan Ermine):not-affected (0.3.7.beta-20)
Ubuntu 20.04 (Focal Fossa):not-affected (0.3.7.beta-20)
More Information

Updated: 2020-04-24 03:17:20 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)