Updated ettercap packages fix security vulnerabilities
Publication date: 07 Jan 2015Modification date: 07 Jan 2015
Type: security
Affected Mageia releases : 4
CVE: CVE-2014-6395 , CVE-2014-6396 , CVE-2014-9376 , CVE-2014-9377 , CVE-2014-9378 , CVE-2014-9379 , CVE-2014-9380 , CVE-2014-9381
Description
Updated ettercap package fixes security vulnerabilities:
Heap-based buffer overflow in the dissector_postgresql function in
dissectors/ec_postgresql.c in Ettercap before 8.1 allows remote attackers to
cause a denial of service or possibly execute arbitrary code via a crafted
password length value that is inconsistent with the actual length of the
password (CVE-2014-6395).
The dissector_postgresql function in dissectors/ec_postgresql.c in Ettercap
before 8.1 allows remote attackers to cause a denial of service and possibly
execute arbitrary code via a crafted password length, which triggers a 0
character to be written to an arbitrary memory location (CVE-2014-6396).
Integer underflow in Ettercap 8.1 allows remote attackers to cause a denial
of service (out-of-bounds write) and possibly execute arbitrary code via a
small size variable value in the dissector_dhcp function in
dissectors/ec_dhcp.c, length value to the dissector_gg function in
dissectors/ec_gg.c, or string length to the get_decode_len function in
ec_utils.c or a request without a username or password to the
dissector_TN3270 function in dissectors/ec_TN3270.c (CVE-2014-9376).
Heap-based buffer overflow in the nbns_spoof function in
plug-ins/nbns_spoof/nbns_spoof.c in Ettercap 8.1 allows remote attackers to
cause a denial of service or possibly execute arbitrary code via a large
netbios packet (CVE-2014-9377).
Ettercap 8.1 does not validate certain return values, which allows remote
attackers to cause a denial of service (crash) or possibly execute arbitrary
code via a crafted name to the parse_line function in mdns_spoof/mdns_spoof.c
or base64 encoded password to the dissector_imap function in
dissectors/ec_imap.c (CVE-2014-9378).
The radius_get_attribute function in dissectors/ec_radius.c in Ettercap 8.1
performs an incorrect cast, which allows remote attackers to cause a denial
of service (crash) or possibly execute arbitrary code via unspecified
vectors, which triggers a stack-based buffer overflow (CVE-2014-9379).
The dissector_cvs function in dissectors/ec_cvs.c in Ettercap 8.1 allows
remote attackers to cause a denial of service (out-of-bounds read) via a
packet containing only a CVS_LOGIN signature (CVE-2014-9380).
Integer signedness error in the dissector_cvs function in dissectors/ec_cvs.c
in Ettercap 8.1 allows remote attackers to cause a denial of service (crash)
via a crafted password, which triggers a large memory allocation
(CVE-2014-9381).
References
- https://bugs.mageia.org/show_bug.cgi?id=14919
- https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6395
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6396
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9376
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9377
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9378
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9379
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9380
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9381
SRPMS
4/core
- ettercap-0.8.0-3.1.mga4