Obrela Security Industries Advisory (OSI-1401)

Advisory ID

OSI-1401

Description

Four vulnerabilities exist on aircrack-ng <= 1.2 Beta 3 which allow remote/local code execution, privilege escalation and denial of service. Specifically, the following vulnerabilities were identified:

  • A stack overflow at airodump-ng gps_tracker() which may lead to code execution, privilege escalation.
  • A length parameter inconsistency at aireplay tcp_test() which may lead to remote code execution.
  • A missing check for data format at buddy-ng which may lead to denial of service.
  • A missing check for invalid values at airserv-ng net_get() which may lead to denial of service.

Researcher

Nick Sampanis (n.sampanis[a t]obrela[do t]com)

Vulnerabilities

gps_tracer stack overflow  CVE-2014-8321

tcp_test length parameter inconsistency CVE-2014-8322

buddy-ng missing check  in data format CVE-2014-8323

net_get missing check for invalid values CVE-2014-8324

Bugs and fixes submit date

3/10/2014

Solution - fix & patch

Download the respective commits from github. Soon a new version will be released but at the time there is no patched version.

https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5

https://github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b550d7b

https://github.com/aircrack-ng/aircrack-ng/commit/da087238963c1239fdabd47dc1b65279605aca70

https://github.com/aircrack-ng/aircrack-ng/commit/88702a3ce4c28a973bf69023cd0312f412f6193e