Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-8322

Опубликовано: 31 янв. 2020
Источник: debian
EPSS Средний

Описание

Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
aircrack-ngfixed1:1.2-0~beta3-2package

Примечания

  • https://github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b550d7b

  • https://github.com/aircrack-ng/aircrack-ng/pull/14

EPSS

Процентиль: 97%
0.32211
Средний

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.

CVSS3: 9.8
nvd
около 6 лет назад

Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.

github
больше 3 лет назад

Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.

EPSS

Процентиль: 97%
0.32211
Средний