DEBIAN-CVE-2014-5439

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2014-5439
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2014-5439.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2014-5439
Upstream
Published
2019-11-19T16:15:11Z
Modified
2025-09-19T06:20:09Z
Summary
[none]
Details

Multiple Stack-based Buffer Overflow vulnerabilities exists in Sniffit prior to 0.3.7 via a crafted configuration file that will bypass Non-eXecutable bit NX, stack smashing protector SSP, and address space layout randomization ASLR protection mechanisms, which could let a malicious user execute arbitrary code.

References

Affected packages

Debian:11 / sniffit

Package

Name
sniffit
Purl
pkg:deb/debian/sniffit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.7.beta-20

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sniffit

Package

Name
sniffit
Purl
pkg:deb/debian/sniffit?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.3.7.beta-20

Ecosystem specific

{
    "urgency": "not yet assigned"
}