Advisory October 31, 2014

Obrela Security Industries Advisory (OSI-1401)

Advisory ID

OSI-1401

Description

Four vulnerabilities exist on aircrack-ng <= 1.2 Beta 3 which allow remote/local code execution, privilege escalation and denial of service. Specifically, the following vulnerabilities were identified:

  • A stack overflow at airodump-ng gps_tracker() which may lead to code execution, privilege escalation.
  • A length parameter inconsistency at aireplay tcp_test() which may lead to remote code execution.
  • A missing check for data format at buddy-ng which may lead to denial of service.
  • A missing check for invalid values at airserv-ng net_get() which may lead to denial of service.

Researcher

Nick Sampanis (n.sampanis@obrela.com)

Vulnerabilities

gps_tracer stack overflow  CVE-2014-8321

tcp_test length parameter inconsistency CVE-2014-8322

buddy-ng missing check  in data format CVE-2014-8323

net_get missing check for invalid values CVE-2014-8324

Bugs and fixes submit date

  • 3/10/2014

Solution – fix & patch

Download the respective commits from github. Soon a new version will be released but at the time there is no patched version.