Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1297727697.2930.17.camel@localhost>
Date: Mon, 14 Feb 2011 18:54:57 -0500
From: Marc Deslauriers <marc.deslauriers@...onical.com>
To: oss-security@...ts.openwall.com
Subject: CVE request: aircrack-ng

Hello,

I can't seem to locate a CVE for this issue:

"Remote buffer overflow in aircrack-ng causes DOS and possible code
execution"
http://seclists.org/bugtraq/2010/Mar/236
http://pyrit.wordpress.com/2010/03/28/remote-exploit-against-aircrack-ng/

version 1.1 was released with the following fix:
http://trac.aircrack-ng.org/changeset/1676

This bug was then opened stating the fix was incomplete:
http://trac.aircrack-ng.org/ticket/728
https://bugzilla.redhat.com/show_bug.cgi?id=577654

And then the following commits were done post-1.1:
http://trac.aircrack-ng.org/changeset/1683
http://trac.aircrack-ng.org/changeset/1687
http://trac.aircrack-ng.org/changeset/1699
http://trac.aircrack-ng.org/changeset/1701
http://trac.aircrack-ng.org/changeset/1702

Thanks,

Marc.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.