Updated ettercap packages fix security vulnerabilities
Publication date: 07 Jan 2015Modification date: 07 Jan 2015
Type: security
Affected Mageia releases : 4
CVE: CVE-2014-6395 , CVE-2014-6396 , CVE-2014-9376 , CVE-2014-9377 , CVE-2014-9378 , CVE-2014-9379 , CVE-2014-9380 , CVE-2014-9381
Description
Updated ettercap package fixes security vulnerabilities: Heap-based buffer overflow in the dissector_postgresql function in dissectors/ec_postgresql.c in Ettercap before 8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted password length value that is inconsistent with the actual length of the password (CVE-2014-6395). The dissector_postgresql function in dissectors/ec_postgresql.c in Ettercap before 8.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted password length, which triggers a 0 character to be written to an arbitrary memory location (CVE-2014-6396). Integer underflow in Ettercap 8.1 allows remote attackers to cause a denial of service (out-of-bounds write) and possibly execute arbitrary code via a small size variable value in the dissector_dhcp function in dissectors/ec_dhcp.c, length value to the dissector_gg function in dissectors/ec_gg.c, or string length to the get_decode_len function in ec_utils.c or a request without a username or password to the dissector_TN3270 function in dissectors/ec_TN3270.c (CVE-2014-9376). Heap-based buffer overflow in the nbns_spoof function in plug-ins/nbns_spoof/nbns_spoof.c in Ettercap 8.1 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a large netbios packet (CVE-2014-9377). Ettercap 8.1 does not validate certain return values, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted name to the parse_line function in mdns_spoof/mdns_spoof.c or base64 encoded password to the dissector_imap function in dissectors/ec_imap.c (CVE-2014-9378). The radius_get_attribute function in dissectors/ec_radius.c in Ettercap 8.1 performs an incorrect cast, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which triggers a stack-based buffer overflow (CVE-2014-9379). The dissector_cvs function in dissectors/ec_cvs.c in Ettercap 8.1 allows remote attackers to cause a denial of service (out-of-bounds read) via a packet containing only a CVS_LOGIN signature (CVE-2014-9380). Integer signedness error in the dissector_cvs function in dissectors/ec_cvs.c in Ettercap 8.1 allows remote attackers to cause a denial of service (crash) via a crafted password, which triggers a large memory allocation (CVE-2014-9381).
References
- https://bugs.mageia.org/show_bug.cgi?id=14919
- https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6395
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9376
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9377
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9378
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9380
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9381
SRPMS
4/core
- ettercap-0.8.0-3.1.mga4