Описание
Stack-based buffer overflow in the eap_do_notify function in eap.c in xsupplicant before 1.2.6, and possibly other versions, allows remote authenticated users to execute arbitrary code via unspecified vectors.
Stack-based buffer overflow in the eap_do_notify function in eap.c in xsupplicant before 1.2.6, and possibly other versions, allows remote authenticated users to execute arbitrary code via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-5601
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29902
- http://open1x.cvs.sourceforge.net/open1x/xsupplicant/src/eap.c?r1=1.135&r2=1.136
- http://secunia.com/advisories/22612
- http://secunia.com/advisories/22641
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:189
- http://www.novell.com/linux/security/advisories/2007_01_sr.html
- http://www.securityfocus.com/bid/20775
- http://www.vupen.com/english/advisories/2006/4233
Связанные уязвимости
Stack-based buffer overflow in the eap_do_notify function in eap.c in xsupplicant before 1.2.6, and possibly other versions, allows remote authenticated users to execute arbitrary code via unspecified vectors.
Stack-based buffer overflow in the eap_do_notify function in eap.c in xsupplicant before 1.2.6, and possibly other versions, allows remote authenticated users to execute arbitrary code via unspecified vectors.
Stack-based buffer overflow in the eap_do_notify function in eap.c in ...