[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-5134

Date: (C)2008-11-18   (M)2016-03-13
 
CVSS Score: 10.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."

Reference:
BID-32484
SECUNIA-32998
SECUNIA-33641
SECUNIA-33706
SECUNIA-33854
DSA-1681
RHSA-2009:0053
SUSE-SA:2009:004
USN-714-1
http://article.gmane.org/gmane.linux.kernel.wireless.general/23049
http://openwall.com/lists/oss-security/2008/11/11/2
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=48735d8d8bd701b1e0cd3d49c21e5e385ddcb077
https://bugzilla.redhat.com/show_bug.cgi?id=470761

CPE    260
cpe:/o:linux:linux_kernel:2.6.20.19
cpe:/o:linux:linux_kernel:2.6.23.1
cpe:/o:linux:linux_kernel:2.6.23.2
cpe:/o:linux:linux_kernel:2.6.23.3
...
CWE    1
CWE-119
OVAL    3
oval:org.mitre.oval:def:7980
oval:org.secpod.oval:def:400061
oval:org.secpod.oval:def:700450

© 2013 SecPod Technologies