Vulnerability Description
Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ettercap-Project | Ettercap | <= 0.7.5.1 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/51731Vendor Advisory
- http://www.exploit-db.com/exploits/23945/Exploit
- http://www.securation.com/files/2013/01/ec.patchPatch
- http://www.securityfocus.com/bid/57175
- https://bugs.gentoo.org/show_bug.cgi?id=451198
- https://bugzilla.redhat.com/show_bug.cgi?id=894092
- http://secunia.com/advisories/51731Vendor Advisory
- http://www.exploit-db.com/exploits/23945/Exploit
- http://www.securation.com/files/2013/01/ec.patchPatch
- http://www.securityfocus.com/bid/57175
- https://bugs.gentoo.org/show_bug.cgi?id=451198
- https://bugzilla.redhat.com/show_bug.cgi?id=894092
FAQ
What is CVE-2013-0722?
CVE-2013-0722 is a vulnerability with a CVSS score of 4.4 (MEDIUM). Stack-based buffer overflow in the scan_load_hosts function in ec_scan.c in Ettercap 0.7.5.1 and earlier might allow local users to gain privileges via a Trojan horse hosts list containing a long line...
How severe is CVE-2013-0722?
CVE-2013-0722 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-0722?
Check the references section above for vendor advisories and patch information. Affected products include: Ettercap-Project Ettercap.