Advisory ID
OSI-1401
Description
Four vulnerabilities exist on aircrack-ng <= 1.2 Beta 3 which allow remote/local code execution, privilege escalation and denial of service. Specifically, the following vulnerabilities were identified:
- A stack overflow at airodump-ng gps_tracker() which may lead to code execution, privilege escalation.
- A length parameter inconsistency at aireplay tcp_test() which may lead to remote code execution.
- A missing check for data format at buddy-ng which may lead to denial of service.
- A missing check for invalid values at airserv-ng net_get() which may lead to denial of service.
Researcher
Nick Sampanis (n.sampanis@obrela.com)
Vulnerabilities
gps_tracer stack overflow CVE-2014-8321
tcp_test length parameter inconsistency CVE-2014-8322
buddy-ng missing check in data format CVE-2014-8323
net_get missing check for invalid values CVE-2014-8324
Bugs and fixes submit date
- 3/10/2014
Solution – fix & patch
Download the respective commits from github. Soon a new version will be released but at the time there is no patched version.
- https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5
- https://github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b550d7b
- https://github.com/aircrack-ng/aircrack-ng/commit/da087238963c1239fdabd47dc1b65279605aca70
- https://github.com/aircrack-ng/aircrack-ng/commit/88702a3ce4c28a973bf69023cd0312f412f6193e