Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200704-16 ] Aircrack-ng: Remote execution of arbitrary code
Date: Sun, 22 Apr 2007 21:23:40
Message-Id: 20070422205728.GC31875@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200704-16
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Aircrack-ng: Remote execution of arbitrary code
9 Date: April 22, 2007
10 Bugs: #174340
11 ID: 200704-16
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Aircrack-ng contains a buffer overflow that could lead to the remote
19 execution of arbitrary code with root privileges.
20
21 Background
22 ==========
23
24 Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can
25 recover keys once enough data packets have been captured.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-wireless/aircrack-ng < 0.7-r2 >= 0.7-r2
34
35 Description
36 ===========
37
38 Jonathan So reported that the airodump-ng module does not correctly
39 check the size of 802.11 authentication packets before copying them
40 into a buffer.
41
42 Impact
43 ======
44
45 A remote attacker could trigger a stack-based buffer overflow by
46 sending a specially crafted 802.11 authentication packet to a user
47 running airodump-ng with the -w (--write) option. This could lead to
48 the remote execution of arbitrary code with the permissions of the user
49 running airodump-ng, which is typically the root user.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time.
55
56 Resolution
57 ==========
58
59 All Aircrack-ng users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=net-wireless/aircrack-ng-0.7-r2"
63
64 References
65 ==========
66
67 [ 1 ] CVE-2007-2057
68 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2057
69
70 Availability
71 ============
72
73 This GLSA and any updates to it are available for viewing at
74 the Gentoo Security Website:
75
76 http://security.gentoo.org/glsa/glsa-200704-16.xml
77
78 Concerns?
79 =========
80
81 Security is a primary focus of Gentoo Linux and ensuring the
82 confidentiality and security of our users machines is of utmost
83 importance to us. Any security concerns should be addressed to
84 security@g.o or alternatively, you may file a bug at
85 http://bugs.gentoo.org.
86
87 License
88 =======
89
90 Copyright 2007 Gentoo Foundation, Inc; referenced text
91 belongs to its owner(s).
92
93 The contents of this document are licensed under the
94 Creative Commons - Attribution / Share Alike license.
95
96 http://creativecommons.org/licenses/by-sa/2.5