Description
Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line.
Exploits (1)
References (6)
Core 6
Core References
Patch x_refsource_misc
http://www.securation.com/files/2013/01/ec.patch
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/23945/
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/51731
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/57175
Issue Tracking x_refsource_confirm
https://bugs.gentoo.org/show_bug.cgi?id=451198
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=894092
Scores
EPSS
0.0017
EPSS Percentile
37.7%
Details
CWE
CWE-119
Status
published
Products (7)
ettercap-project/ettercap
0.6.3.1
ettercap-project/ettercap
0.7.2
ettercap-project/ettercap
0.7.3
ettercap-project/ettercap
0.7.4
ettercap-project/ettercap
0.7.4.1
ettercap-project/ettercap
0.7.5
ettercap-project/ettercap
< 0.7.5.1
Published
Jan 11, 2013
Tracked Since
Feb 18, 2026