oss-sec mailing list archives
CVE request: aircrack-ng EAPOL buffer overflow
From: Florian Weimer <fw () deneb enyo de>
Date: Wed, 14 Apr 2010 11:08:30 +0200
An exploit for a security vulnerability in aircrack-ng has been published: | The tools' code responsible for parsing IEEE802.11-packets assumes the | self-proclaimed length of a EAPOL-packet to be correct and never to exceed | a (arbitrary) maximum size of 256 bytes for packets that are part of the | EAPOL-authentication. [...] <http://pyrit.googlecode.com/svn/tags/opt/aircrackng_exploit.py> The fix seems to be fixed in r1676 and r1683: <http://trac.aircrack-ng.org/changeset/1676> <http://trac.aircrack-ng.org/changeset/1683>
Current thread:
- CVE request: aircrack-ng EAPOL buffer overflow Florian Weimer (Apr 14)
- Re: CVE request: aircrack-ng EAPOL buffer overflow Josh Bressers (Apr 14)