{"id":"CVE-2010-3843","details":"The GTK version of ettercap uses a global settings file at /tmp/.ettercap_gtk and does not verify ownership of this file. When parsing this file for settings in gtkui_conf_read() (src/interfacesgtk/ec_gtk_conf.c), an unchecked sscanf() call allows a maliciously placed settings file to overflow a statically-sized buffer on the stack.","modified":"2025-08-09T19:01:28Z","published":"2021-05-28T13:15:07Z","references":[{"type":"FIX","url":"https://bugs.launchpad.net/ubuntu/+source/ettercap/+bug/656347"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=643453"},{"type":"WEB","url":"http://article.gmane.org/gmane.comp.security.oss.general/3660"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}