First published: Mon Sep 17 2007(Updated: )
Description of problem: Kees Cook reported this to the Debian BTS: There is a stack overflow in wpa_supplicant when handling TSF info from drivers that support it. Patch attached.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
wpa_supplicant | <=0.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6025 is classified as a high severity vulnerability due to its potential to allow remote attackers to cause a stack overflow.
To fix CVE-2007-6025, users should upgrade to wpa_supplicant version 0.6.1 or later.
CVE-2007-6025 affects wpa_supplicant versions 0.6.0 and earlier.
CVE-2007-6025 can be exploited by remote attackers causing a stack-based buffer overflow.
Yes, exploits for CVE-2007-6025 may be published, but the details can vary.