CVE-2014-5439

EUVD-2014-5327
Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 61%
Affected Products (NVD)
VendorProductVersion
sniffit_projectsniffit
𝑥
≤ 0.3.7
debiandebian_linux
8.0
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sniffit
bookworm
0.5-3
fixed
bullseye
0.5-1
fixed
sid
0.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sniffit
artful
not-affected
bionic
not-affected
cosmic
not-affected
disco
not-affected
eoan
not-affected
focal
not-affected
groovy
not-affected
precise
ignored
trusty
Fixed 0.3.7.beta-17+deb8u1build0.14.04.1
released
xenial
Fixed 0.3.7.beta-19ubuntu0.1
released
yakkety
ignored
zesty
not-affected