search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Airodump-ng buffer overflow vulnerability

Vulnerability Note VU#349828

Original Release Date: 2007-04-25 | Last Revised: 2007-07-17


The airodump-ng program, which is a part of the aircrack-ng suite, contains a buffer overflow vulnerability. If successfully exploited, this vulnerability may allow an attacker to execute code.


The aircrack-ng suite is a group of related programs that can be used to recover WEP and WPA-PSK keys from active 802.11 wireless networks. The aircrack-ng suite also includes programs that can inject and collect raw wireless frames, enable wireless monitor mode, and create network interfaces that can be used for wireless intrustion detection systems (IDS). Airodump-ng is one of the programs that is included with the aircrack-ng suite.

The airodump-ng program contains a buffer overflow vulnerability. This vulnerability occurs because airodump-ng fails to properly check the size of 802.11 authentication packets. An attacker within radio range may be able to exploit this vulnerability by sending a specially crafted 802.11 frame to a vulnerable system.


A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.


This issue as been addressed in the 0.9 development version of aircrack-ng.

Vendor Information


Aircrack-ng Affected

Updated:  April 16, 2007



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


See for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to Jonathan So, Ash Willis, and the aircrack-ng team for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: None
Severity Metric: 0.96
Date Public: 2007-04-12
Date First Published: 2007-04-25
Date Last Updated: 2007-07-17 15:48 UTC
Document Revision: 20

Sponsored by CISA.