Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 451198 (CVE-2013-0722) - <net-analyzer/ettercap-0.7.5.2: "scan_load_hosts()" Buffer Overflow Vulnerability (CVE-2013-0722)
Summary: <net-analyzer/ettercap-0.7.5.2: "scan_load_hosts()" Buffer Overflow Vulnerabi...
Status: RESOLVED FIXED
Alias: CVE-2013-0722
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://secunia.com/advisories/51731/
Whiteboard: B2 [glsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-01-10 15:46 UTC by Agostino Sarubbo
Modified: 2014-05-17 19:30 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-01-10 15:46:42 UTC
From $URL :

Description
A vulnerability has been discovered in Ettercap, which can be exploited by malicious people to 
compromise a user's system.

The vulnerability is caused due to a boundary error within the "scan_load_hosts()" function 
(src/ec_scan.c) when parsing entries from hosts list, which can be exploited to cause a stack-based 
buffer overflow via an overly long entry.

Successful exploitation may allow execution of arbitrary code but requires tricking a users into 
using a malicious host file.

The vulnerability is confirmed in version 0.7.5.1. Other versions may also be affected.


Solution
No official solution is currently available.

Provided and/or discovered by
Sajjad Pourali

Original Advisory
http://www.exploit-db.com/exploits/23945/
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2013-01-16 00:22:07 UTC
CVE-2013-0722 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0722):
  Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in
  Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via
  a Trojan horse hosts list containing a long line.
Comment 2 Agostino Sarubbo gentoo-dev 2013-01-29 12:12:24 UTC
Arches, please test and mark stable:
=net-analyzer/ettercap-0.7.5.2
Target keywords : "alpha amd64 arm hppa ppc ppc64 sparc x86"
Comment 3 Agostino Sarubbo gentoo-dev 2013-01-29 14:36:50 UTC
amd64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2013-01-29 14:37:05 UTC
x86 stable
Comment 5 Agostino Sarubbo gentoo-dev 2013-01-29 14:37:20 UTC
ppc stable
Comment 6 Agostino Sarubbo gentoo-dev 2013-01-29 14:37:35 UTC
ppc64 stable
Comment 7 Jeroen Roovers (RETIRED) gentoo-dev 2013-01-29 15:51:43 UTC
Stable for HPPA.
Comment 8 Agostino Sarubbo gentoo-dev 2013-01-29 21:43:09 UTC
alpha stable
Comment 9 Agostino Sarubbo gentoo-dev 2013-01-29 22:06:55 UTC
sparc stable
Comment 10 Agostino Sarubbo gentoo-dev 2013-01-29 22:37:09 UTC
arm stable
Comment 11 Sean Amoss (RETIRED) gentoo-dev Security 2013-02-26 00:06:24 UTC
Added to existing GLSA draft.
Comment 12 GLSAMaker/CVETool Bot gentoo-dev 2014-05-17 19:30:15 UTC
This issue was resolved and addressed in
 GLSA 201405-12 at http://security.gentoo.org/glsa/glsa-201405-12.xml
by GLSA coordinator Sean Amoss (ackle).