An issue was discovered in WinAPRS 2.9.0. A buffer overflow in DIGI address processing for VHF KISS packets allows a remote attacker to cause a denial of service (daemon crash) via a malicious AX.25 packet over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
https://winaprs.com/ | Product Vendor Advisory |
https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 | Exploit Third Party Advisory |
https://winaprs.com/ | Product Vendor Advisory |
https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://winaprs.com/ - Product, Vendor Advisory | |
References | () https://www.coalfire.com/the-coalfire-blog/hacking-ham-radio-winaprs-part1 - Exploit, Third Party Advisory |
07 Nov 2023, 03:44
Type | Values Removed | Values Added |
---|---|---|
Summary | An issue was discovered in WinAPRS 2.9.0. A buffer overflow in DIGI address processing for VHF KISS packets allows a remote attacker to cause a denial of service (daemon crash) via a malicious AX.25 packet over the air. NOTE: This vulnerability only affects products that are no longer supported by the maintainer |
Information
Published : 2022-06-02 14:15
Updated : 2024-11-21 06:50
NVD link : CVE-2022-24700
Mitre link : CVE-2022-24700
CVE.ORG link : CVE-2022-24700
JSON object : View
Products Affected
winaprs
- winaprs
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')