network.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter.
References
Link | Resource |
---|---|
http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html | Issue Tracking Vendor Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143216.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143595.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-November/143606.html | Third Party Advisory |
http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html | Patch Third Party Advisory VDB Entry |
http://security.gentoo.org/glsa/glsa-201411-08.xml | Third Party Advisory |
http://www.securityfocus.com/archive/1/533869/100/0/threaded | |
https://bugzilla.redhat.com/show_bug.cgi?id=1159812 | Issue Tracking Patch Third Party Advisory |
https://github.com/aircrack-ng/aircrack-ng/commit/88702a3ce4c28a973bf69023cd0312f412f6193e | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-10-17 14:29
Updated : 2024-02-04 19:29
NVD link : CVE-2014-8324
Mitre link : CVE-2014-8324
CVE.ORG link : CVE-2014-8324
JSON object : View
Products Affected
aircrack-ng
- aircrack-ng
CWE
CWE-20
Improper Input Validation