Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5134

Опубликовано: 18 нояб. 2008
Источник: debian
EPSS Низкий

Описание

Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6not-affectedetchpackage
linux-2.6fixed2.6.26-11package
linux-2.6.24fixed2.6.24-6~etchnhalf.7package

EPSS

Процентиль: 85%
0.02819
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."

redhat
около 17 лет назад

Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."

nvd
около 17 лет назад

Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."

github
больше 3 лет назад

Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."

EPSS

Процентиль: 85%
0.02819
Низкий