Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Linux |
|
Redhat |
|
Configuration 1 [-]
|
Package | CPE | Advisory | Released Date |
---|---|---|---|
MRG for RHEL-5 | |||
kernel-rt-0:2.6.24.7-101.el5rt | cpe:/a:redhat:enterprise_mrg:1::el5 | RHSA-2009:0053 | 2009-02-04T00:00:00Z |
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T10:40:17.187Z
Reserved: 2008-11-18T00:00:00
Link: CVE-2008-5134

No data.

Status : Modified
Published: 2008-11-18T16:00:00.813
Modified: 2024-11-21T00:53:22.017
Link: CVE-2008-5134
