Vulnerabilities > CVE-2014-5439 - Out-of-bounds Write vulnerability in multiple products

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
sniffit-project
debian
CWE-787
critical
nessus

Summary

Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.

Common Weakness Enumeration (CWE)

Nessus

NASL familyDebian Local Security Checks
NASL idDEBIAN_DLA-713.NASL
descriptionIt was discovered that there was a buffer overflow in the packet sniffer and monitoring tool
last seen2020-03-17
modified2016-11-22
plugin id95029
published2016-11-22
reporterThis script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/95029
titleDebian DLA-713-1 : sniffit security update

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/129292/sniffit-escalate.txt
idPACKETSTORM:129292
last seen2016-12-05
published2014-11-27
reporterHector Marco
sourcehttps://packetstormsecurity.com/files/129292/Sniffit-Root-Shell.html
titleSniffit Root Shell