First published: Fri Jul 27 2007(Updated: )
Buffer overflow in the wpa_printf function in the debugging code in wpa_supplicant in the Fedora NetworkManager package before 0.6.5-3.fc7 allows user-assisted remote attackers to execute arbitrary code via malformed frames on a WPA2 network. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora Core | <=0.6.5-3.fc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2874 is considered a critical vulnerability due to the potential for remote code execution.
To fix CVE-2007-2874, update to the latest version of the NetworkManager package as specified by Red Hat.
CVE-2007-2874 affects Red Hat Fedora Core versions before 0.6.5-3.fc7.
CVE-2007-2874 is associated with user-assisted remote code execution attacks through malformed frames on WPA2 networks.
The vulnerability in CVE-2007-2874 resides in the wpa_printf function within the debugging code of wpa_supplicant.