Gentoo Archives: gentoo-announce

From: Sean Amoss <ackle@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201405-12 ] Ettercap: Multiple vulnerabilities
Date: Sat, 17 May 2014 19:30:42
Message-Id: 5377B884.1090804@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201405-12
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Ettercap: Multiple vulnerabilities
9 Date: May 17, 2014
10 Bugs: #340897, #451198
11 ID: 201405-12
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in Ettercap, the worst of
19 which may allow execution of arbitrary code.
20
21 Background
22 ==========
23
24 Ettercap is a suite of tools for content filtering, sniffing and man in
25 the middle attacks on a LAN.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-analyzer/ettercap < 0.7.5.2 >= 0.7.5.2
34
35 Description
36 ===========
37
38 Multiple vulnerabilities have been discovered in Ettercap:
39
40 * Ettercap does not handle temporary files securely (CVE-2010-3843).
41 * A format string flaw in Ettercap could cause a buffer overflow
42 (CVE-2010-3844).
43 * A stack-based buffer overflow exists in Ettercap (CVE-2013-0722).
44
45 Impact
46 ======
47
48 A remote attacker could entice a user to load a specially crafted
49 configuration file using Ettercap, possibly resulting in execution of
50 arbitrary code with the privileges of the process or a Denial of
51 Service condition.
52
53 A local attacker could perform symlink attacks to overwrite arbitrary
54 files with the privileges of the user running the application.
55
56 Workaround
57 ==========
58
59 There is no known workaround at this time.
60
61 Resolution
62 ==========
63
64 All Ettercap users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=net-analyzer/ettercap-0.7.5.2"
68
69 References
70 ==========
71
72 [ 1 ] CVE-2010-3843
73 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3843
74 [ 2 ] CVE-2010-3844
75 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3844
76 [ 3 ] CVE-2013-0722
77 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0722
78
79 Availability
80 ============
81
82 This GLSA and any updates to it are available for viewing at
83 the Gentoo Security Website:
84
85 http://security.gentoo.org/glsa/glsa-201405-12.xml
86
87 Concerns?
88 =========
89
90 Security is a primary focus of Gentoo Linux and ensuring the
91 confidentiality and security of our users' machines is of utmost
92 importance to us. Any security concerns should be addressed to
93 security@g.o or alternatively, you may file a bug at
94 https://bugs.gentoo.org.
95
96 License
97 =======
98
99 Copyright 2014 Gentoo Foundation, Inc; referenced text
100 belongs to its owner(s).
101
102 The contents of this document are licensed under the
103 Creative Commons - Attribution / Share Alike license.
104
105 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature