The airodump-ng program, which is a part of the aircrack-ng suite, contains a buffer overflow vulnerability. If successfully exploited, this vulnerability may allow an attacker to execute code.
The aircrack-ng suite is a group of related programs that can be used to recover WEP and WPA-PSK keys from active 802.11 wireless networks. The aircrack-ng suite also includes programs that can inject and collect raw wireless frames, enable wireless monitor mode, and create network interfaces that can be used for wireless intrustion detection systems (IDS). Airodump-ng is one of the programs that is included with the aircrack-ng suite.
The airodump-ng program contains a buffer overflow vulnerability. This vulnerability occurs because airodump-ng fails to properly check the size of 802.11 authentication packets. An attacker within radio range may be able to exploit this vulnerability by sending a specially crafted 802.11 frame to a vulnerable system.
A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.
Thanks to Jonathan So, Ash Willis, and the aircrack-ng team for information that was used in this report.
This document was written by Ryan Giobbi.
|Date First Published:||2007-04-25|
|Date Last Updated:||2007-07-17 15:48 UTC|