Vulnerability Name: | CVE-2005-2626 (CCN-21851) | ||||||||||||
Assigned: | 2005-08-16 | ||||||||||||
Published: | 2005-08-16 | ||||||||||||
Updated: | 2011-03-08 | ||||||||||||
Summary: | Unspecified vulnerability in Kismet before 2005-08-R1 allows remote attackers to have an unknown impact via unprintable characters in the SSID. | ||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Other | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2005-2626 Source: MITRE Type: CNA CVE-2005-2657 Source: CCN Type: SA16447 Kismet Multiple Vulnerabilities Source: SECUNIA Type: UNKNOWN 16447 Source: SECUNIA Type: UNKNOWN 16477 Source: SECUNIA Type: UNKNOWN 16634 Source: CCN Type: SA16822 common-lisp-controller Cache Directory Privilege Escalation Source: DEBIAN Type: UNKNOWN DSA-788 Source: DEBIAN Type: DSA-788 kismet -- several vulnerabilities Source: DEBIAN Type: DSA-811 common-lisp-controller -- design error Source: CCN Type: GLSA-200508-10 Kismet: Multiple vulnerabilities Source: GENTOO Type: UNKNOWN GLSA-200508-10 Source: CCN Type: Kismet Web site Kismet Source: CONFIRM Type: UNKNOWN http://www.kismetwireless.net/blog/?entry=/kismet/entry-1124158146.txt Source: CCN Type: Kismet Change log Kismet Source: CONFIRM Type: UNKNOWN http://www.kismetwireless.net/CHANGELOG Source: SUSE Type: UNKNOWN SUSE-SR:2005:020 Source: OSVDB Type: UNKNOWN 18767 Source: CCN Type: OSVDB ID: 18767 Kismet SSID Character Processing Issue Source: BID Type: UNKNOWN 14430 Source: CCN Type: BID-14430 Kismet Multiple Remote Vulnerabilities Source: CCN Type: BID-14829 Common-Lisp-Controller Cache Arbitrary Code Injection Vulnerability Source: VUPEN Type: UNKNOWN ADV-2005-1422 Source: XF Type: UNKNOWN kismet-ssid-unspecified(21851) Source: SUSE Type: SUSE-SR:2005:020 SUSE Security Summary Report | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |