First published: Mon Oct 28 2013(Updated: )
Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aircrack-ng Aircrack-ng | =1.0-rc4 | |
Aircrack-ng Aircrack-ng | =0.9.2 | |
Aircrack-ng Aircrack-ng | <=1.0 | |
Aircrack-ng Aircrack-ng | =0.4.1 | |
Aircrack-ng Aircrack-ng | =0.5 | |
Aircrack-ng Aircrack-ng | =0.9.1 | |
Aircrack-ng Aircrack-ng | =1.0-beta2 | |
Aircrack-ng Aircrack-ng | =0.2 | |
Aircrack-ng Aircrack-ng | =0.4 | |
Aircrack-ng Aircrack-ng | =0.1 | |
Aircrack-ng Aircrack-ng | =0.4.4 | |
Aircrack-ng Aircrack-ng | =1.0-rc3 | |
Aircrack-ng Aircrack-ng | =1.0-rc1 | |
Aircrack-ng Aircrack-ng | =0.8 | |
Aircrack-ng Aircrack-ng | =0.2.1 | |
Aircrack-ng Aircrack-ng | =0.4.3 | |
Aircrack-ng Aircrack-ng | =0.6.2 | |
Aircrack-ng Aircrack-ng | =0.7 | |
Aircrack-ng Aircrack-ng | =0.9.3 | |
Aircrack-ng Aircrack-ng | =1.0-beta1 | |
Aircrack-ng Aircrack-ng | =0.3 | |
Aircrack-ng Aircrack-ng | =1.0-rc2 | |
Aircrack-ng Aircrack-ng | =0.6 | |
Aircrack-ng Aircrack-ng | =0.6.1 | |
Aircrack-ng Aircrack-ng | =0.4.2 | |
Aircrack-ng Aircrack-ng | =0.9 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.