Untriaged
An unchecked sscanf() call in ettercap before 0.7.5 allows an …
An unchecked sscanf() call in ettercap before 0.7.5 allows an insecure temporary settings file to overflow a static-sized buffer on the stack.
References
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600130 x_refsource_MISC
-
https://security-tracker.debian.org/tracker/CVE-2010-3844 x_refsource_MISC
-
https://access.redhat.com/security/cve/cve-2010-3844 x_refsource_MISC
-
https://github.com/Ettercap/ettercap/commit/4ef3ede30181eca9add74305ad26dbcb0c3686a0 x_refsource_MISC x_transferred
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=600130 x_refsource_MISC
-
https://security-tracker.debian.org/tracker/CVE-2010-3844 x_refsource_MISC
-
https://access.redhat.com/security/cve/cve-2010-3844 x_refsource_MISC
-
https://github.com/Ettercap/ettercap/commit/4ef3ede30181eca9add74305ad26dbcb0c3686a0 x_refsource_MISC x_transferred
Affected products
ettercap
- ==0.7.3
Matching in nixpkgs
pkgs.ettercap
Comprehensive suite for man in the middle attacks
-
nixos-unstable 0.8.4-unstable-2025-07-16
- nixpkgs-unstable 0.8.4-unstable-2025-07-16
- nixos-unstable-small 0.8.4-unstable-2025-07-16
-
nixos-25.11 0.8.4-unstable-2025-07-16
- nixos-25.11-small 0.8.4-unstable-2025-07-16
- nixpkgs-25.11-darwin 0.8.4-unstable-2025-07-16
Package maintainers
-
@y0no Yoann Ono <y0no@y0no.fr>
-
@pSub Pascal Wittmann <mail@pascal-wittmann.de>