6.8
CVE-2010-1159
- EPSS 26.4%
- Published 28.10.2013 22:55:03
- Last modified 11.04.2025 00:51:21
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
Multiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet.
Data is provided by the National Vulnerability Database (NVD)
Aircrack-ng ≫ Aircrack-ng Version <= 1.0
Aircrack-ng ≫ Aircrack-ng Version0.1
Aircrack-ng ≫ Aircrack-ng Version0.2
Aircrack-ng ≫ Aircrack-ng Version0.2.1
Aircrack-ng ≫ Aircrack-ng Version0.3
Aircrack-ng ≫ Aircrack-ng Version0.4
Aircrack-ng ≫ Aircrack-ng Version0.4.1
Aircrack-ng ≫ Aircrack-ng Version0.4.2
Aircrack-ng ≫ Aircrack-ng Version0.4.3
Aircrack-ng ≫ Aircrack-ng Version0.4.4
Aircrack-ng ≫ Aircrack-ng Version0.5
Aircrack-ng ≫ Aircrack-ng Version0.6
Aircrack-ng ≫ Aircrack-ng Version0.6.1
Aircrack-ng ≫ Aircrack-ng Version0.6.2
Aircrack-ng ≫ Aircrack-ng Version0.7
Aircrack-ng ≫ Aircrack-ng Version0.8
Aircrack-ng ≫ Aircrack-ng Version0.9
Aircrack-ng ≫ Aircrack-ng Version0.9.1
Aircrack-ng ≫ Aircrack-ng Version0.9.2
Aircrack-ng ≫ Aircrack-ng Version0.9.3
Aircrack-ng ≫ Aircrack-ng Version1.0 Updatebeta1
Aircrack-ng ≫ Aircrack-ng Version1.0 Updatebeta2
Aircrack-ng ≫ Aircrack-ng Version1.0 Updaterc1
Aircrack-ng ≫ Aircrack-ng Version1.0 Updaterc2
Aircrack-ng ≫ Aircrack-ng Version1.0 Updaterc3
Aircrack-ng ≫ Aircrack-ng Version1.0 Updaterc4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 26.4% | 0.961 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.