Vulnerabilities > CVE-2014-5439 - Out-of-bounds Write vulnerability in multiple products
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DLA-713.NASL |
description | It was discovered that there was a buffer overflow in the packet sniffer and monitoring tool |
last seen | 2020-03-17 |
modified | 2016-11-22 |
plugin id | 95029 |
published | 2016-11-22 |
reporter | This script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/95029 |
title | Debian DLA-713-1 : sniffit security update |
Packetstorm
data source | https://packetstormsecurity.com/files/download/129292/sniffit-escalate.txt |
id | PACKETSTORM:129292 |
last seen | 2016-12-05 |
published | 2014-11-27 |
reporter | Hector Marco |
source | https://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.html |
title | Sniffit Root Shell |
References
- http://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.html
- http://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.html
- http://seclists.org/fulldisclosure/2014/Nov/88
- http://seclists.org/fulldisclosure/2014/Nov/88
- http://www.securityfocus.com/bid/71318
- http://www.securityfocus.com/bid/71318