[arch-security] [ASA-201709-16] ettercap: multiple issues
Jelle van der Waa
jelle at archlinux.org
Mon Sep 18 19:38:43 UTC 2017
Arch Linux Security Advisory ASA-201709-16
==========================================
Severity: High
Date : 2017-09-18
CVE-ID : CVE-2017-6430 CVE-2017-8366
Package : ettercap
Type : multiple issues
Remote : No
Link : https://security.archlinux.org/AVG-212
Summary
=======
The package ettercap before version 0.8.2-5 is vulnerable to multiple
issues including arbitrary code execution and denial of service.
Resolution
==========
Upgrade to 0.8.2-5.
# pacman -Syu "ettercap>=0.8.2-5"
The problems have been fixed upstream but no release is available yet.
Workaround
==========
None.
Description
===========
- CVE-2017-6430 (denial of service)
The compile_tree function in ef_compiler.c in the Etterfilter utility
in Ettercap 0.8.2 and earlier allows attackers to cause a denial of
service (out-of-bounds read) via a crafted filter.
- CVE-2017-8366 (arbitrary code execution)
The strescape function in ec_strings.c in Ettercap 0.8.2 allows
attackers to cause a denial of service (heap-based buffer overflow and
application crash) or possibly execute arbitrary code via a crafted
filter that is mishandled by etterfilter.
Impact
======
An attacker is able to crash the application or execute arbitrary code
by tricking the user to open a specially crafted filter.
References
==========
https://github.com/Ettercap/ettercap/issues/782
https://github.com/Ettercap/ettercap/commit/7f50c57b2101fe75592c8dc9960883bbd1878bce
https://github.com/Ettercap/ettercap/issues/792
https://github.com/Ettercap/ettercap/issues/789
https://github.com/Ettercap/ettercap/commit/1083d604930ebb9f350126b83802ecd2cbc17f90
https://security.archlinux.org/CVE-2017-6430
https://security.archlinux.org/CVE-2017-8366
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: not available
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20170918/f9c6d6b6/attachment.asc>
More information about the arch-security
mailing list