1
Candidate: CVE-2014-9378
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9378
5
https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/
6
https://github.com/Ettercap/ettercap/pull/610
7
https://github.com/Ettercap/ettercap/pull/604
9
Ettercap 0.8.1 does not validate certain return values, which allows remote
10
attackers to cause a denial of service (crash) or possibly execute
11
arbitrary code via a crafted (1) name to the parse_line function in
12
mdns_spoof/mdns_spoof.c or (2) base64 encoded password to the
13
dissector_imap function in dissectors/ec_imap.c.
17
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773416
23
upstream_ettercap: released (1:0.8.1-3)
24
lucid_ettercap: ignored (reached end-of-life)
25
precise_ettercap: ignored (reached end-of-life)
26
precise/esm_ettercap: DNE (precise was needed)
27
trusty_ettercap: needed
28
utopic_ettercap: ignored (reached end-of-life)
29
vivid_ettercap: not-affected (1:0.8.1-3)
30
vivid/stable-phone-overlay_ettercap: DNE
31
vivid/ubuntu-core_ettercap: DNE
32
wily_ettercap: not-affected (1:0.8.1-3)
33
xenial_ettercap: not-affected (1:0.8.1-3)
34
yakkety_ettercap: not-affected (1:0.8.1-3)
35
zesty_ettercap: not-affected (1:0.8.1-3)
36
artful_ettercap: not-affected (1:0.8.1-3)
37
bionic_ettercap: not-affected (1:0.8.1-3)
38
devel_ettercap: not-affected (1:0.8.1-3)