Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 315341 - <net-wireless/aircrack-ng-1.1: packet parsing buffer overflow (CVE-2010-1159)
Summary: <net-wireless/aircrack-ng-1.1: packet parsing buffer overflow (CVE-2010-1159)
Status: RESOLVED DUPLICATE of bug 311797
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://trac.aircrack-ng.org/changeset...
Whiteboard: B2 [ebuild]
Keywords:
: 317223 (view as bug list)
Depends on:
Blocks:
 
Reported: 2010-04-14 21:32 UTC by Tomás Touceda (RETIRED)
Modified: 2010-04-29 21:07 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Tomás Touceda (RETIRED) gentoo-dev 2010-04-14 21:32:11 UTC
"The tools' code responsible for parsing IEEE802.11-packets assumes the
self-proclaimed length of a EAPOL-packet to be correct and never to exceed
a (arbitrary) maximum size of 256 bytes for packets that are part of the
EAPOL-authentication."

Upstream fixes:
http://trac.aircrack-ng.org/changeset/1676
http://trac.aircrack-ng.org/changeset/1683
Comment 1 Arfrever Frehtes Taifersar Arahesis (RETIRED) gentoo-dev 2010-04-23 00:00:10 UTC
Commit message of r1683 suggests that this problem is not yet fixed in airbase-ng.
Comment 2 Arfrever Frehtes Taifersar Arahesis (RETIRED) gentoo-dev 2010-04-29 20:35:16 UTC
Fix in airbase-ng:
http://trac.aircrack-ng.org/changeset/1687
Comment 3 Arfrever Frehtes Taifersar Arahesis (RETIRED) gentoo-dev 2010-04-29 20:35:38 UTC
*** Bug 317223 has been marked as a duplicate of this bug. ***
Comment 4 Arfrever Frehtes Taifersar Arahesis (RETIRED) gentoo-dev 2010-04-29 21:07:18 UTC

*** This bug has been marked as a duplicate of bug 311797 ***