CVE-2014-8322

NameCVE-2014-8322
DescriptionStack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs767979

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
aircrack-ng (PTS)buster1:1.5.2-3fixed
bullseye1:1.6+git20210130.91820bc-1fixed
bookworm1:1.7-5fixed
sid1:1.7+git20230807.4bf83f1a-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
aircrack-ngsource(unstable)1:1.2-0~beta3-2767979

Notes

https://github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b550d7b
https://github.com/aircrack-ng/aircrack-ng/pull/14

Search for package or bug name: Reporting problems