buddy-ng.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter.
References
Link | Resource |
---|---|
https://github.com/aircrack-ng/aircrack-ng/commit/da087238963c1239fdabd47dc1b65279605aca70 | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1159812 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/71085 | Third Party Advisory VDB Entry |
http://security.gentoo.org/glsa/glsa-201411-08.xml | Third Party Advisory |
http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html | Patch Third Party Advisory VDB Entry |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143606.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143595.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143216.html | Third Party Advisory |
http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html | Issue Tracking Vendor Advisory |
http://www.securityfocus.com/archive/1/533869/100/0/threaded |
Configurations
Information
Published : 2017-10-17 07:29
Updated : 2018-10-09 12:53
NVD link : CVE-2014-8323
Mitre link : CVE-2014-8323
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
aircrack-ng
- aircrack-ng