| Summary: | ettercap missing update for security issue CVE-2010-3843 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, pterjan, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/480389/ | ||
| Whiteboard: | MGA2-32-OK MGA2-64-OK | ||
| Source RPM: | ettercap-0.7.4.1-1.mga2.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2012-08-09 00:08:48 CEST
David Walser
2012-08-09 00:09:00 CEST
CC:
(none) =>
pterjan I'll be testing Mageia 2 i586 shortly. CC:
(none) =>
davidwhodgins I don't see anything in the package or repositories related to a gtk version of ettercap. With the ettercap program running, lsof -n|grep etter|grep tmp doesn't show any files being used in /tmp. Which program actually creates and uses /tmp/.ettercap_gtk? Whiteboard:
(none) =>
feedback ettercap has multiple different interfaces built in, selectable with a command-line option.
From the man page:
-C, --curses
Ncurses based GUI. See ettercap_curses(8) for a full description.
-G, --gtk
The nice GTK2 interface (thanks Daten...).
So ettercap -G runs the gtk interface. A reproducer using that is on the RH bug:
https://bugzilla.redhat.com/show_bug.cgi?id=643453Whiteboard:
feedback =>
(none) Thanks. Problem confirmed on Mageia 2 i586 ettercap 0.7.4.1 copyright 2001-2011 ALoR & NaGA Ooops ! This shouldn't happen... Segmentation Fault... I'll test the update now. Testing complete on Mageia 2 i586 and x86-64. Could someone from the sysadmin team push the srpm ettercap-0.7.4.1-1.1.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: Updated ettercap package fixes security vulnerability: The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfaces/gtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack (CVE-2010-3843). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3843 http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072925.html https://bugs.mageia.org/show_bug.cgi?id=6988 Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0214 Status:
NEW =>
RESOLVED |