9.8
CVSSv3

CVE-2014-8322

Published: 31/01/2020 Updated: 05/02/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng prior to 1.2 RC 1 allows remote malicious users to execute arbitrary code via a crafted length parameter value.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

aircrack-ng aircrack-ng

aircrack-ng aircrack-ng 1.2

Vendor Advisories

Debian Bug report logs - #767979 aircrack-ng: CVE-2014-8321 CVE-2014-8322 CVE-2014-8323 CVE-2014-8324 Package: aircrack-ng; Maintainer for aircrack-ng is Debian Security Tools <team+pkg-security@trackerdebianorg>; Source for aircrack-ng is src:aircrack-ng (PTS, buildd, popcon) Reported by: Salvatore Bonaccorso <carnil@d ...

Exploits

/* * Exploit Title: Aireplay "tcp_test" Length Parameter Inconsistency * Date: 10/3/2014 * Exploit Author: Nick Sampanis * Vendor Homepage: wwwaircrack-ngorg/ * Version: Aireplay-ng 12 beta3 * Tested on: Kali Linux 109 x64 * CVE : CVE-2014-8322 * Description: Affected option "aireplay-ng --test" */ #include <stdioh> #in ...