Bug 11320 - CVE-2006-7178..CVE-2006-7180 in madwifi < 0.93
: CVE-2006-7178..CVE-2006-7180 in madwifi < 0.93
Status: CLOSED FIXED
: Sisyphus
(All bugs in Sisyphus/kernel-source-madwifi)
: unstable
: all Linux
: P2 major
Assigned To:
:
: http://secunia.com/advisories/24670/
:
:
:
  Show dependency tree
 
Reported: 2007-04-02 23:21 by
Modified: 2007-06-04 14:12 (History)


Attachments


Note

You need to log in before you can comment on or make changes to this bug.


Description From 2007-04-02 23:21:11
Some vulnerabilities have been reported in MadWifi, which can be exploited by
malicious people to gain knowledge of potentially sensitive information or cause
a DoS (Denial of Service).

1) An error within the "ieee80211_input()" function when handling AUTH frames
from IBSS nodes can be exploited to cause a kernel crash by sending specially
crafted AUTH frames.

Successful exploitation may require that the "Ad-Hoc" mode is used.

2) MadWifi does not correctly handle Channel Switch Announcements. This can be
exploited to force a channel switch thus interrupting the communication by
injecting a Channel Switch Announcement with "CS Count" set to 1 or less.

3) An error within ieee80211_output.c may cause unencrypted packets to be sent
before the WPA authentication is completed. This can be exploited to gain
knowledge of certain sensitive information, which may be leveraged for further
attacks.

The vulnerabilities are reported in versions prior to 0.9.3.

Solution:
Update to version 0.9.3.

Provided and/or discovered by:
1) kurth
2, 3) Reported by the vendor.
------- Comment #1 From 2007-04-02 23:26:00 -------
Последним его собирал taf@, у меня уже и карточки поломались на Atheros.
------- Comment #2 From 2007-06-04 14:12:52 -------
lakostis@ обновил kernel-source-madwifi до версии 0.9.3.1 23 мая.