First published: Mon Oct 28 2013(Updated: )
Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aircrack-ng | =1.0-rc4 | |
Aircrack-ng | =0.9.2 | |
Aircrack-ng | <=1.0 | |
Aircrack-ng | =0.4.1 | |
Aircrack-ng | =0.5 | |
Aircrack-ng | =0.9.1 | |
Aircrack-ng | =1.0-beta2 | |
Aircrack-ng | =0.2 | |
Aircrack-ng | =0.4 | |
Aircrack-ng | =0.1 | |
Aircrack-ng | =0.4.4 | |
Aircrack-ng | =1.0-rc3 | |
Aircrack-ng | =1.0-rc1 | |
Aircrack-ng | =0.8 | |
Aircrack-ng | =0.2.1 | |
Aircrack-ng | =0.4.3 | |
Aircrack-ng | =0.6.2 | |
Aircrack-ng | =0.7 | |
Aircrack-ng | =0.9.3 | |
Aircrack-ng | =1.0-beta1 | |
Aircrack-ng | =0.3 | |
Aircrack-ng | =1.0-rc2 | |
Aircrack-ng | =0.6 | |
Aircrack-ng | =0.6.1 | |
Aircrack-ng | =0.4.2 | |
Aircrack-ng | =0.9 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1159 is classified as a moderate severity vulnerability due to its potential to cause a denial of service and execute arbitrary code.
To mitigate CVE-2010-1159, upgrade to a patched version of Aircrack-ng that is 1.1 or later.
CVE-2010-1159 affects Aircrack-ng versions before 1.1, including 0.1 to 1.0-rc4.
CVE-2010-1159 enables remote attackers to cause denial of service and potentially execute arbitrary code via specially crafted EAPOL packets.
CVE-2010-1159 is a remote vulnerability, allowing attackers to exploit it from a different machine.