Vulnerability Description
Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sniffit Project | Sniffit | <= 0.3.7 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.htmlExploitPatchThird Party Advisory
- http://seclists.org/fulldisclosure/2014/Nov/88
- http://www.securityfocus.com/bid/71318
- http://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.htmlExploitPatchThird Party Advisory
- http://seclists.org/fulldisclosure/2014/Nov/88
- http://www.securityfocus.com/bid/71318
FAQ
What is CVE-2014-5439?
CVE-2014-5439 is a vulnerability with a CVSS score of 7.8 (HIGH). Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address...
How severe is CVE-2014-5439?
CVE-2014-5439 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-5439?
Check the references section above for vendor advisories and patch information. Affected products include: Sniffit Project Sniffit, Debian Debian Linux.