6.8
CVE-2010-1159
- EPSS 26.4%
- Veröffentlicht 28.10.2013 22:55:03
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- Teams Watchlist Login
- Unerledigt Login
Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Aircrack-ng ≫ Aircrack-ng Version <= 1.0
Aircrack-ng ≫ Aircrack-ng Version0.1
Aircrack-ng ≫ Aircrack-ng Version0.2
Aircrack-ng ≫ Aircrack-ng Version0.2.1
Aircrack-ng ≫ Aircrack-ng Version0.3
Aircrack-ng ≫ Aircrack-ng Version0.4
Aircrack-ng ≫ Aircrack-ng Version0.4.1
Aircrack-ng ≫ Aircrack-ng Version0.4.2
Aircrack-ng ≫ Aircrack-ng Version0.4.3
Aircrack-ng ≫ Aircrack-ng Version0.4.4
Aircrack-ng ≫ Aircrack-ng Version0.5
Aircrack-ng ≫ Aircrack-ng Version0.6
Aircrack-ng ≫ Aircrack-ng Version0.6.1
Aircrack-ng ≫ Aircrack-ng Version0.6.2
Aircrack-ng ≫ Aircrack-ng Version0.7
Aircrack-ng ≫ Aircrack-ng Version0.8
Aircrack-ng ≫ Aircrack-ng Version0.9
Aircrack-ng ≫ Aircrack-ng Version0.9.1
Aircrack-ng ≫ Aircrack-ng Version0.9.2
Aircrack-ng ≫ Aircrack-ng Version0.9.3
Aircrack-ng ≫ Aircrack-ng Version1.0 Updatebeta1
Aircrack-ng ≫ Aircrack-ng Version1.0 Updatebeta2
Aircrack-ng ≫ Aircrack-ng Version1.0 Updaterc1
Aircrack-ng ≫ Aircrack-ng Version1.0 Updaterc2
Aircrack-ng ≫ Aircrack-ng Version1.0 Updaterc3
Aircrack-ng ≫ Aircrack-ng Version1.0 Updaterc4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 26.4% | 0.961 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.