CVE-2026-3606

A vulnerability has been found in Ettercap 0.8.4-Garofalo. Affected by this vulnerability is the function add_data_segment of the file src/ettercap/utils/etterfilter/ef_output.c of the component etterfilter. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/Ettercap/ettercap/ Product
https://github.com/Ettercap/ettercap/issues/1297 Exploit Issue Tracking
https://github.com/oneafter/0202/blob/main/et/repro Product
https://vuldb.com/?ctiid.349218 Permissions Required VDB Entry
https://vuldb.com/?id.349218 Third Party Advisory VDB Entry
https://vuldb.com/?submit.764648 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:ettercap-project:ettercap:0.8.4:*:*:*:*:*:*:*

History

16 Mar 2026, 15:42

Type Values Removed Values Added
References () https://github.com/Ettercap/ettercap/ - () https://github.com/Ettercap/ettercap/ - Product
References () https://github.com/Ettercap/ettercap/issues/1297 - () https://github.com/Ettercap/ettercap/issues/1297 - Exploit, Issue Tracking
References () https://github.com/oneafter/0202/blob/main/et/repro - () https://github.com/oneafter/0202/blob/main/et/repro - Product
References () https://vuldb.com/?ctiid.349218 - () https://vuldb.com/?ctiid.349218 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349218 - () https://vuldb.com/?id.349218 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.764648 - () https://vuldb.com/?submit.764648 - Exploit, Third Party Advisory, VDB Entry
CPE cpe:2.3:a:ettercap-project:ettercap:0.8.4:*:*:*:*:*:*:*
CWE CWE-787
First Time Ettercap-project
Ettercap-project ettercap

09 Mar 2026, 13:36

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en Ettercap 0.8.4-Garofalo. Afectada por esta vulnerabilidad es la función add_data_segment del archivo src/ettercap/utils/etterfilter/ef_output.c del componente etterfilter. La manipulación conduce a una lectura fuera de límites. Se requiere acceso local para abordar este ataque. El exploit ha sido revelado al público y puede ser usado. El proyecto fue informado del problema tempranamente a través de un informe de problema pero no ha respondido aún.

05 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 22:16

Updated : 2026-04-29 01:00


NVD link : CVE-2026-3606

Mitre link : CVE-2026-3606

CVE.ORG link : CVE-2026-3606


JSON object : View

Products Affected

ettercap-project

  • ettercap
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write