blob: b74ef01de5691467b4563f5eac85a4a5084f9d87 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200506-07">
<title>Ettercap: Format string vulnerability</title>
A format string vulnerability in Ettercap could allow a remote attacker to
execute arbitrary code.
<product type="ebuild">ettercap</product>
<announced>June 11, 2005</announced>
<revised>June 11, 2005: 01</revised>
<package name="net-analyzer/ettercap" auto="yes" arch="*">
<unaffected range="ge">0.7.3</unaffected>
<vulnerable range="lt">0.7.3</vulnerable>
Ettercap is a suite of tools for content filtering, sniffing and
man in the middle attacks on a LAN.
The curses_msg function of Ettercap's Ncurses-based user interface
insecurely implements formatted printing.
<impact type="high">
A remote attacker could craft a malicious network flow that would
result in executing arbitrary code with the rights of the user running
the Ettercap tool, which is often root.
There is no known workaround at this time.
All Ettercap users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/ettercap-0.7.3&quot;</code>
<uri link="">CAN-2005-1796</uri>
<metadata tag="requester" timestamp="Wed, 08 Jun 2005 08:05:23 +0000">
<metadata tag="submitter" timestamp="Wed, 08 Jun 2005 16:01:35 +0000">
<metadata tag="bugReady" timestamp="Sat, 11 Jun 2005 08:22:41 +0000">