Arch Linux Security Advisory ASA-201709-16 ========================================== Severity: High Date : 2017-09-18 CVE-ID : CVE-2017-6430 CVE-2017-8366 Package : ettercap Type : multiple issues Remote : No Link : https://security.archlinux.org/AVG-212 Summary ======= The package ettercap before version 0.8.2-5 is vulnerable to multiple issues including arbitrary code execution and denial of service. Resolution ========== Upgrade to 0.8.2-5. # pacman -Syu "ettercap>=0.8.2-5" The problems have been fixed upstream but no release is available yet. Workaround ========== None. Description =========== - CVE-2017-6430 (denial of service) The compile_tree function in ef_compiler.c in the Etterfilter utility in Ettercap 0.8.2 and earlier allows attackers to cause a denial of service (out-of-bounds read) via a crafted filter. - CVE-2017-8366 (arbitrary code execution) The strescape function in ec_strings.c in Ettercap 0.8.2 allows attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code via a crafted filter that is mishandled by etterfilter. Impact ====== An attacker is able to crash the application or execute arbitrary code by tricking the user to open a specially crafted filter. References ========== https://github.com/Ettercap/ettercap/issues/782 https://github.com/Ettercap/ettercap/commit/7f50c57b2101fe75592c8dc9960883bbd1878bce https://github.com/Ettercap/ettercap/issues/792 https://github.com/Ettercap/ettercap/issues/789 https://github.com/Ettercap/ettercap/commit/1083d604930ebb9f350126b83802ecd2cbc17f90 https://security.archlinux.org/CVE-2017-6430 https://security.archlinux.org/CVE-2017-8366