Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-6025

Опубликовано: 15 сент. 2007
Источник: redhat

Описание

Stack-based buffer overflow in driver_wext.c in wpa_supplicant 0.6.0 and earlier allows remote attackers to cause a denial of service (crash) via crafted TSF data.

Отчет

Not vulnerable. This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 4 and 5.

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=292991Stack overflow when handling TSF from the driver

Связанные уязвимости

ubuntu
почти 18 лет назад

Stack-based buffer overflow in driver_wext.c in wpa_supplicant 0.6.0 and earlier allows remote attackers to cause a denial of service (crash) via crafted TSF data.

nvd
почти 18 лет назад

Stack-based buffer overflow in driver_wext.c in wpa_supplicant 0.6.0 and earlier allows remote attackers to cause a denial of service (crash) via crafted TSF data.

debian
почти 18 лет назад

Stack-based buffer overflow in driver_wext.c in wpa_supplicant 0.6.0 a ...

github
больше 3 лет назад

Stack-based buffer overflow in driver_wext.c in wpa_supplicant 0.6.0 and earlier allows remote attackers to cause a denial of service (crash) via crafted TSF data.