Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 10 Jan 2013 09:57:19 -0700
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Confirming CVE for ettercap buffer overflow flaw (CVE-2012-0722?)

This isn't on MITRE's site (reserved), and the initial advisory
indicates that this has a CVE of CVE-2012-0722.  Can someone confirm
that this is the correct CVE name?



A stack-based buffer overflow was reported [1],[2] in Ettercap <=
0.7.5.1.  A boundary error within the scan_load_hosts() function (in
src/ec_scan.c), when parsing entries from a hosts list, could be
exploited to cause a stack-based buffer overflow via an overly long
entry.  In order to exploit this, a user must be tricked into loading a
malicious host file.

This has not yet been corrected upstream, but a proposed patch is
available [3].

The initial report [1] indicates that this was given the name
CVE-2012-0722.

[1] http://www.exploit-db.com/exploits/23945/
[2] https://secunia.com/advisories/51731/
[3] http://www.securation.com/files/2013/01/ec.patch

Also:

https://bugzilla.redhat.com/show_bug.cgi?id=894092
https://bugs.gentoo.org/show_bug.cgi?id=451198

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.