oss-sec mailing list archives
Confirming CVE for ettercap buffer overflow flaw (CVE-2012-0722?)
From: Vincent Danen <vdanen () redhat com>
Date: Thu, 10 Jan 2013 09:57:19 -0700
This isn't on MITRE's site (reserved), and the initial advisory indicates that this has a CVE of CVE-2012-0722. Can someone confirm that this is the correct CVE name? A stack-based buffer overflow was reported [1],[2] in Ettercap <= 0.7.5.1. A boundary error within the scan_load_hosts() function (in src/ec_scan.c), when parsing entries from a hosts list, could be exploited to cause a stack-based buffer overflow via an overly long entry. In order to exploit this, a user must be tricked into loading a malicious host file. This has not yet been corrected upstream, but a proposed patch is available [3]. The initial report [1] indicates that this was given the name CVE-2012-0722. [1] http://www.exploit-db.com/exploits/23945/ [2] https://secunia.com/advisories/51731/ [3] http://www.securation.com/files/2013/01/ec.patch Also: https://bugzilla.redhat.com/show_bug.cgi?id=894092 https://bugs.gentoo.org/show_bug.cgi?id=451198 --Vincent Danen / Red Hat Security Response Team
Current thread:
- Confirming CVE for ettercap buffer overflow flaw (CVE-2012-0722?) Vincent Danen (Jan 10)
- Re: Confirming CVE for ettercap buffer overflow flaw (CVE-2012-0722?) Steven M. Christey (Jan 10)
- Re: Confirming CVE for ettercap buffer overflow flaw (CVE-2012-0722?) cve-assign (Jan 11)
- Re: Confirming CVE for ettercap buffer overflow flaw (CVE-2012-0722?) Vincent Danen (Jan 11)