CVE-2014-5439

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-5439
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2014-5439.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2014-5439
Related
Published
2019-11-19T16:15:11Z
Modified
2024-11-21T02:12:03Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.

References

Affected packages

Debian:11 / sniffit

Package

Name
sniffit
Purl
pkg:deb/debian/sniffit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.7.beta-20

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sniffit

Package

Name
sniffit
Purl
pkg:deb/debian/sniffit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.7.beta-20

Ecosystem specific

{
    "urgency": "not yet assigned"
}