CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
95.4%
Stack-based buffer overflow in the parseTaggedData function in WavePacket.mm in KisMAC R54 through R73p allows remote attackers to execute arbitrary code via multiple SSIDs in a Cisco vendor tag in a 802.11 management frame.
Vendor | Product | Version | CPE |
---|---|---|---|
kismac | kismac | 0.1a | cpe:2.3:a:kismac:kismac:0.1a:*:*:*:*:*:*:* |
kismac | kismac | 0.1b | cpe:2.3:a:kismac:kismac:0.1b:*:*:*:*:*:*:* |
kismac | kismac | 0.1c | cpe:2.3:a:kismac:kismac:0.1c:*:*:*:*:*:*:* |
kismac | kismac | 0.2a | cpe:2.3:a:kismac:kismac:0.2a:*:*:*:*:*:*:* |
kismac | kismac | 0.5d | cpe:2.3:a:kismac:kismac:0.5d:*:*:*:*:*:*:* |
kismac | kismac | 0.5d4 | cpe:2.3:a:kismac:kismac:0.5d4:*:*:*:*:*:*:* |
kismac | kismac | 0.10a | cpe:2.3:a:kismac:kismac:0.10a:*:*:*:*:*:*:* |
kismac | kismac | 0.11a | cpe:2.3:a:kismac:kismac:0.11a:*:*:*:*:*:*:* |
kismac | kismac | 0.12a | cpe:2.3:a:kismac:kismac:0.12a:*:*:*:*:*:*:* |
kismac.de/_trac/changeset/113
lists.grok.org.uk/pipermail/full-disclosure/2006-March/044323.html
secunia.com/advisories/19354
securityreason.com/securityalert/609
www.hardened-php.net/advisory_032006.115.html
www.osvdb.org/24072
www.securityfocus.com/archive/1/428537/100/0/threaded
www.securityfocus.com/bid/17198
www.vupen.com/english/advisories/2006/1070
exchange.xforce.ibmcloud.com/vulnerabilities/25422