Aircrack-ng Airodump-ng Authentication Packet Buffer Overflow Vulnerability

Aircrack-ng Airodump-ng is prone to a remote buffer-overflow because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

Only applications running with '-w or --write' parameters are vulnerable to this issue.

An attacker could exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service.

Airodump-ng 0.7 is vulnerable to this issue; other versions may also be vulnerable.


 

Privacy Statement
Copyright 2010, SecurityFocus