Impact
The vulnerability resides in the add_data_segment function of Ettercap’s ef_output.c file, enabling an out-of-bounds read that can expose sensitive data from the process’s memory. The flaw allows an attacker who can execute commands locally on the host running Ettercap to read beyond the intended buffer limits, potentially revealing configuration details or captured network traffic. While this does not lead to remote code execution or privilege escalation, the material that can be retrieved may contain confidential information, compromising confidentiality of the compromised system.
Affected Systems
The issue affects Ettercap versions identified by the CPE strings, specifically version 0.8.4 of the Ettercap project. No other affected versions are listed in the available CNA data, so users of 0.8.4 should consider upgrading or disabling the vulnerable component.
Risk and Exploitability
With a CVSS score of 4.8 and an EPSS probability of less than 1%, the vulnerability presents a moderate severity that is unlikely to be widely exploited, especially since it requires local access. It is not listed in the CISA KEV catalog, indicating no confirmed exploitation. Nevertheless, because the flaw permits leakage of potentially sensitive data, the risk is significant enough to warrant remediation as a priority, especially for systems handling critical network traffic.
OpenCVE Enrichment