** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered in WinAPRS 2.9.0. A buffer overflow in DIGI address processing for VHF KISS packets allows a remote attacker to cause a denial of service (daemon crash) via a malicious AX.25 packet over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 | Exploit Third Party Advisory |
https://winaprs.com/ | Product Vendor Advisory |
Configurations
Information
Published : 2022-06-02 07:15
Updated : 2022-06-10 11:46
NVD link : CVE-2022-24700
Mitre link : CVE-2022-24700
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
winaprs
- winaprs