
CVE-2014-8321 – Aircrack-ng 1.2 Beta 3 DoS / Code Execution
https://notcve.org/view.php?id=CVE-2014-8321
03 Nov 2014 — Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors. Un desbordamiento del búfer en la región stack de la memoria en la función gps_tracker en el archivo airodump-ng.c en Aircrack-ng versiones anteriores a 1.2 RC 1, permite a usuarios locales ejecutar código arbitrario o alcanzar privilegios por medio de vectores no especificados. Multiple vulnerabilities have been foun... • http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html • CWE-787: Out-of-bounds Write •

CVE-2014-8322 – Aireplay-ng 1.2 beta3 - 'tcp_test' Length Stack Overflow
https://notcve.org/view.php?id=CVE-2014-8322
03 Nov 2014 — Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value. Un desbordamiento del búfer en la región stack de la memoria en la función tcp_test en el archivo aireplay-ng.c en Aircrack-ng versiones anteriores a 1.2 RC 1, permite a atacantes remotos ejecutar código arbitrario por medio de un valor del parámetro length diseñado. Multiple vulnerabilities have been found in Aircrack-ng... • https://www.exploit-db.com/exploits/35018 • CWE-787: Out-of-bounds Write •

CVE-2014-8323 – Aircrack-ng 1.2 Beta 3 DoS / Code Execution
https://notcve.org/view.php?id=CVE-2014-8323
03 Nov 2014 — buddy-ng.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter. buddy-ng.c en Aircrack-ng en versiones anteriores a la 1.2 Beta 3 permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) a través de una respuesta con una longitud de parámetro manipulada. Multiple vulnerabilities have been found in Aircrack-ng, possibly resulting in local privilege escalation, remote code execu... • http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html • CWE-20: Improper Input Validation •

CVE-2014-8324 – Aircrack-ng 1.2 Beta 3 DoS / Code Execution
https://notcve.org/view.php?id=CVE-2014-8324
03 Nov 2014 — network.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter. network.c en Aircrack-ng en versiones anteriores a 1.2 Beta 3 permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) a través de una respuesta con una longitud de parámetro manipulada. Multiple vulnerabilities have been found in Aircrack-ng, possibly resulting in local privilege escalation, remote code execution,... • http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html • CWE-20: Improper Input Validation •

CVE-2010-1159 – Aircrack-NG Tools svn r1675 - Remote Heap Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2010-1159
07 Oct 2013 — Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet. Múltiples desbordamientos de buffer basados en memoria dinámica en Aircrack-ng anteriores a 1.1 permiten a atacantes remotos causar denegación de servicio (caída) y ejecutar código arbitrario a través de (1) un valor grande en un paquete EAPOL o (2) un paquete EAPOL grande. A buffer over... • https://www.exploit-db.com/exploits/12217 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-2057 – Aircrack-NG 0.7 - 'Specially Crafted 802.11 Packets' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-2057
18 Apr 2007 — Stack-based buffer overflow in aircrack-ng airodump-ng 0.7 allows remote attackers to execute arbitrary code via crafted 802.11 authentication packets. Desbordamiento de búfer basado en pila en aircrack-ng airodump-ng 0.7 permite a atacantes remotos mediante a paquetes de autenticación 802.11 manipulados artesanalmente. • https://www.exploit-db.com/exploits/3724 •