CVE-2014-5439
Published: 19 November 2019
Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.
From the Ubuntu Security Team
It was discovered that SniffIt incorrectly handled certain configuration files. An attacker could possibly use this issue to execute arbitrary code.
Notes
Author | Note |
---|---|
sbeattie | sniffit is not setuid, so this issue only affects configurations where a user is only permitted to run a subset of administrative (e.g. using a sudo configuration that only allows a user to run sniffit). |
Priority
Status
Package | Release | Status |
---|---|---|
sniffit Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(0.3.7.beta-20)
|
bionic |
Not vulnerable
(0.3.7.beta-20)
|
|
cosmic |
Not vulnerable
(0.3.7.beta-20)
|
|
disco |
Not vulnerable
(0.3.7.beta-20)
|
|
eoan |
Not vulnerable
(0.3.7.beta-20)
|
|
focal |
Not vulnerable
(0.3.7.beta-20)
|
|
groovy |
Not vulnerable
(0.3.7.beta-20)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Released
(0.3.7.beta-17+deb8u1build0.14.04.1)
|
|
upstream |
Released
(0.3.7.beta-20)
|
|
xenial |
Released
(0.3.7.beta-19ubuntu0.1)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Not vulnerable
(0.3.7.beta-20)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |