Vulnerability Description
Buffer overflow in the wpa_printf function in the debugging code in wpa_supplicant in the Fedora NetworkManager package before 0.6.5-3.fc7 allows user-assisted remote attackers to execute arbitrary code via malformed frames on a WPA2 network. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Fedora Core | <= 0.6.5-3.fc7 |
References
- http://fedoraproject.org/wiki/FSA/F7/FEDORA-2007-0186Patch
- http://osvdb.org/46833
- http://www.redhat.com/archives/fedora-package-announce/2007-June/msg00032.htmlPatch
- http://www.vupen.com/english/advisories/2007/2053
- http://fedoraproject.org/wiki/FSA/F7/FEDORA-2007-0186Patch
- http://osvdb.org/46833
- http://www.redhat.com/archives/fedora-package-announce/2007-June/msg00032.htmlPatch
- http://www.vupen.com/english/advisories/2007/2053
FAQ
What is CVE-2007-2874?
CVE-2007-2874 is a vulnerability with a CVSS score of 5.8 (MEDIUM). Buffer overflow in the wpa_printf function in the debugging code in wpa_supplicant in the Fedora NetworkManager package before 0.6.5-3.fc7 allows user-assisted remote attackers to execute arbitrary co...
How severe is CVE-2007-2874?
CVE-2007-2874 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2874?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Fedora Core.