From 577c9ab5f139eaaf61f69b5fec736af626fbc82e Mon Sep 17 00:00:00 2001 From: Stefan Fritsch Date: Thu, 17 May 2007 09:11:12 +0000 Subject: aircrack-ng adv git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@5857 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- data/DTSA/advs/33-aircrack-ng.adv | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 data/DTSA/advs/33-aircrack-ng.adv (limited to 'data/DTSA/advs') diff --git a/data/DTSA/advs/33-aircrack-ng.adv b/data/DTSA/advs/33-aircrack-ng.adv new file mode 100644 index 0000000000..c3715e1200 --- /dev/null +++ b/data/DTSA/advs/33-aircrack-ng.adv @@ -0,0 +1,15 @@ +source: aircrack-ng +date: May 16th, 2007 +author: Stefan Fritsch +vuln-type: programming error +problem-scope: remote +debian-specifc: no +cve: CVE-2007-2057 +vendor-advisory: http://www.nop-art.net/advisories/airodump-ng.txt +testing-fix: 1:0.8-0.1lenny1 +sid-fix: 1:0.7-3 +upgrade: apt-get install aircrack-ng + +It was discovered that aircrack-ng, a WEP/WPA security analysis tool, performs +insufficient validation of 802.11 authentication packets, which allows the +execution of arbitrary code. -- cgit v1.2.3