Four vulnerabilities exist on aircrack-ng <= 1.2 Beta 3 which allow remote/local code execution, privilege escalation and denial of service. Specifically, the following vulnerabilities were identified:
- A stack overflow at airodump-ng gps_tracker() which may lead to code execution, privilege escalation.
- A length parameter inconsistency at aireplay tcp_test() which may lead to remote code execution.
- A missing check for data format at buddy-ng which may lead to denial of service.
- A missing check for invalid values at airserv-ng net_get() which may lead to denial of service.
Nick Sampanis (email@example.com)
gps_tracer stack overflow CVE-2014-8321
tcp_test length parameter inconsistency CVE-2014-8322
buddy-ng missing check in data format CVE-2014-8323
net_get missing check for invalid values CVE-2014-8324
Bugs and fixes submit date
Solution – fix & patch
Download the respective commits from github. Soon a new version will be released but at the time there is no patched version.