Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cxq4-49hh-68j9

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The 802.11 network stack in net80211/ieee80211_input.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system hang) via a crafted length field in nested 802.3 Ethernet frames in Fast Frame packets, which results in a NULL pointer dereference.

The 802.11 network stack in net80211/ieee80211_input.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system hang) via a crafted length field in nested 802.3 Ethernet frames in Fast Frame packets, which results in a NULL pointer dereference.

EPSS

Процентиль: 88%
0.03862
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The 802.11 network stack in net80211/ieee80211_input.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system hang) via a crafted length field in nested 802.3 Ethernet frames in Fast Frame packets, which results in a NULL pointer dereference.

nvd
больше 18 лет назад

The 802.11 network stack in net80211/ieee80211_input.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system hang) via a crafted length field in nested 802.3 Ethernet frames in Fast Frame packets, which results in a NULL pointer dereference.

debian
больше 18 лет назад

The 802.11 network stack in net80211/ieee80211_input.c in MadWifi befo ...

EPSS

Процентиль: 88%
0.03862
Низкий