5 results (0.011 seconds)

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

network.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter. network.c en Aircrack-ng en versiones anteriores a 1.2 Beta 3 permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) a través de una respuesta con una longitud de parámetro manipulada. • http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143216.html http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143595.html http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143606.html http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html http://security.gentoo.org/glsa/glsa-201411-08.xml http://www.securityfocus.com/archiv • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

buddy-ng.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter. buddy-ng.c en Aircrack-ng en versiones anteriores a la 1.2 Beta 3 permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) a través de una respuesta con una longitud de parámetro manipulada. • http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143216.html http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143595.html http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143606.html http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html http://security.gentoo.org/glsa/glsa-201411-08.xml http://www.securityfocus.com/archiv • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. Un desbordamiento del búfer en la región stack de la memoria en la función gps_tracker en el archivo airodump-ng.c en Aircrack-ng versiones anteriores a 1.2 RC 1, permite a usuarios locales ejecutar código arbitrario o alcanzar privilegios por medio de vectores no especificados. • http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html https://exchange.xforce.ibmcloud.com/vulnerabilities/98458 https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5 https://github.com/aircrack-ng/aircrack-ng/pull/13 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 8%CPEs: 4EXPL: 1

Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value. Un desbordamiento del búfer en la región stack de la memoria en la función tcp_test en el archivo aireplay-ng.c en Aircrack-ng versiones anteriores a 1.2 RC 1, permite a atacantes remotos ejecutar código arbitrario por medio de un valor del parámetro length diseñado. • https://www.exploit-db.com/exploits/35018 http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html http://www.exploit-db.com/exploits/35018 https://exchange.xforce.ibmcloud.com/vulnerabilities/98459 https://github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b550d7b https://github.com/aircrack-ng/aircrack-ng/pull/14 • CWE-787: Out-of-bounds Write •

CVSS: 6.8EPSS: 42%CPEs: 27EXPL: 1

Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet. Múltiples desbordamientos de buffer basados en memoria dinámica en Aircrack-ng anteriores a 1.1 permiten a atacantes remotos causar denegación de servicio (caída) y ejecutar código arbitrario a través de (1) un valor grande en un paquete EAPOL o (2) un paquete EAPOL grande. • https://www.exploit-db.com/exploits/12217 http://pyrit.googlecode.com/svn/tags/opt/aircrackng_exploit.py http://secunia.com/advisories/39150 http://secunia.com/advisories/55053 http://security.gentoo.org/glsa/glsa-201310-06.xml http://svn.aircrack-ng.org/trunk/ChangeLog • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •