Multiple heap-based buffer overflows in Aircrack-ng prior to 1.1 allow remote malicious users to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
aircrack-ng aircrack-ng |
||
aircrack-ng aircrack-ng 1.0 |
||
aircrack-ng aircrack-ng 0.5 |
||
aircrack-ng aircrack-ng 0.4.4 |
||
aircrack-ng aircrack-ng 0.4.3 |
||
aircrack-ng aircrack-ng 0.4.2 |
||
aircrack-ng aircrack-ng 0.9.2 |
||
aircrack-ng aircrack-ng 0.9.1 |
||
aircrack-ng aircrack-ng 0.9 |
||
aircrack-ng aircrack-ng 0.8 |
||
aircrack-ng aircrack-ng 0.2 |
||
aircrack-ng aircrack-ng 0.1 |
||
gentoo linux |
||
aircrack-ng aircrack-ng 0.6.2 |
||
aircrack-ng aircrack-ng 0.6 |
||
aircrack-ng aircrack-ng 0.4.1 |
||
aircrack-ng aircrack-ng 0.3 |
||
aircrack-ng aircrack-ng 0.9.3 |
||
aircrack-ng aircrack-ng 0.7 |
||
aircrack-ng aircrack-ng 0.6.1 |
||
aircrack-ng aircrack-ng 0.4 |
||
aircrack-ng aircrack-ng 0.2.1 |