Ettercap 0.8.1 does not validate certain return values, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted (1) name to the parse_line function in mdns_spoof/mdns_spoof.c or (2) base64 encoded password to the dissector_imap function in dissectors/ec_imap.c.
https://www.obrela.com/home/security-labs/advisories/osi-advisory-osi-1402/
https://security.gentoo.org/glsa/201505-01
https://github.com/Ettercap/ettercap/pull/610
https://github.com/Ettercap/ettercap/pull/604
http://www.securityfocus.com/bid/71695
http://www.securityfocus.com/archive/1/534248/100/0/threaded