aircrack-ng
Page content
- Author: voroskoi
- Vulnerable: 0.7-1
- Unaffected: 0.7-2terminus1
Jonathan So has reported a vulnerability in Aircrack-ng, which can be exploited by malicious people to compromise a user’s system. The vulnerability is caused due to a boundary error within the airodump-ng module when processing 802.11 authentication packets. This can be exploited to cause a stack-based buffer overflow via a specially crafted 802.11 packet. Successful exploitation allows execution of arbitrary code and requires that the application is logging packets with the -w or –write option.
- Bug Tracker URL: http://bugs.frugalware.org/task/1947
CVEs:
- There is no CVE for this issue, see: http://secunia.com/advisories/24880