summaryrefslogtreecommitdiffstats
path: root/data/DTSA
diff options
context:
space:
mode:
authorStefan Fritsch <sf@sfritsch.de>2007-05-17 09:11:12 +0000
committerStefan Fritsch <sf@sfritsch.de>2007-05-17 09:11:12 +0000
commit577c9ab5f139eaaf61f69b5fec736af626fbc82e (patch)
treef245f06e9ffd930ecccdd055ead151c801a68b87 /data/DTSA
parent26bcc565fb38dc2541a6e02db9142ad19c8319e6 (diff)
aircrack-ng adv
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@5857 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/DTSA')
-rw-r--r--data/DTSA/advs/33-aircrack-ng.adv15
-rw-r--r--data/DTSA/list4
2 files changed, 19 insertions, 0 deletions
diff --git a/data/DTSA/advs/33-aircrack-ng.adv b/data/DTSA/advs/33-aircrack-ng.adv
new file mode 100644
index 0000000000..c3715e1200
--- /dev/null
+++ b/data/DTSA/advs/33-aircrack-ng.adv
@@ -0,0 +1,15 @@
+source: aircrack-ng
+date: May 16th, 2007
+author: Stefan Fritsch
+vuln-type: programming error
+problem-scope: remote
+debian-specifc: no
+cve: CVE-2007-2057
+vendor-advisory: http://www.nop-art.net/advisories/airodump-ng.txt
+testing-fix: 1:0.8-0.1lenny1
+sid-fix: 1:0.7-3
+upgrade: apt-get install aircrack-ng
+
+It was discovered that aircrack-ng, a WEP/WPA security analysis tool, performs
+insufficient validation of 802.11 authentication packets, which allows the
+execution of arbitrary code.
diff --git a/data/DTSA/list b/data/DTSA/list
index 44a63d0604..e6e4f9e61e 100644
--- a/data/DTSA/list
+++ b/data/DTSA/list
@@ -92,3 +92,7 @@
[March 3rd, 2007] DTSA-34-1 wordpress - cross-site scripting
{CVE-2007-1049 }
[etch] - wordpress 2.0.9-1
+[May 16th, 2007] DTSA-33-1 aircrack-ng - programming error
+ {CVE-2007-2057 }
+ - aircrack-ng 1:0.8-0.1lenny1
+ TODO: unreleased

© 2014-2024 Faster IT GmbH | imprint | privacy policy