|
Message-ID: <20130110165719.GD2638@redhat.com> Date: Thu, 10 Jan 2013 09:57:19 -0700 From: Vincent Danen <vdanen@...hat.com> To: oss-security@...ts.openwall.com Cc: "Steven M. Christey" <coley@...us.mitre.org> Subject: Confirming CVE for ettercap buffer overflow flaw (CVE-2012-0722?) This isn't on MITRE's site (reserved), and the initial advisory indicates that this has a CVE of CVE-2012-0722. Can someone confirm that this is the correct CVE name? A stack-based buffer overflow was reported [1],[2] in Ettercap <= 0.7.5.1. A boundary error within the scan_load_hosts() function (in src/ec_scan.c), when parsing entries from a hosts list, could be exploited to cause a stack-based buffer overflow via an overly long entry. In order to exploit this, a user must be tricked into loading a malicious host file. This has not yet been corrected upstream, but a proposed patch is available [3]. The initial report [1] indicates that this was given the name CVE-2012-0722. [1] http://www.exploit-db.com/exploits/23945/ [2] https://secunia.com/advisories/51731/ [3] http://www.securation.com/files/2013/01/ec.patch Also: https://bugzilla.redhat.com/show_bug.cgi?id=894092 https://bugs.gentoo.org/show_bug.cgi?id=451198 -- Vincent Danen / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.