CVE-2010-1159

NameCVE-2010-1159
DescriptionMultiple heap-based buffer overflows in Aircrack-ng before 1.1 allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) large length value in an EAPOL packet or (2) long EAPOL packet.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs577758

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
aircrack-ng (PTS)stretch1:1.2-0~rc4-2fixed
buster1:1.5.2-3fixed
bullseye1:1.6+git20210130.91820bc-1fixed
bookworm, sid1:1.6+git20210130.91820bc-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aircrack-ngsource(unstable)1:1.1-1low577758

Notes

[lenny] - aircrack-ng <no-dsa> (low)
[etch] - aircrack-ng <no-dsa> (low)
http://pyrit.googlecode.com/svn/tags/opt/aircrackng_exploit.py

Search for package or bug name: Reporting problems