#VU34843 Stack-based buffer overflow in aircrack-ng - CVE-2014-8322
Published: January 31, 2020 / Updated: August 9, 2020
aircrack-ng
aircrack-ng
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the tcp_test function in aireplay-ng.c when processing a crafted length parameter value. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- http://www.exploit-db.com/exploits/35018
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98459
- https://github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b550d7b
- https://github.com/aircrack-ng/aircrack-ng/pull/14