Some vulnerabilities have been reported in MadWifi, which can be exploited by malicious people to gain knowledge of potentially sensitive information or cause a DoS (Denial of Service). 1) An error within the "ieee80211_input()" function when handling AUTH frames from IBSS nodes can be exploited to cause a kernel crash by sending specially crafted AUTH frames. Successful exploitation may require that the "Ad-Hoc" mode is used. 2) MadWifi does not correctly handle Channel Switch Announcements. This can be exploited to force a channel switch thus interrupting the communication by injecting a Channel Switch Announcement with "CS Count" set to 1 or less. 3) An error within ieee80211_output.c may cause unencrypted packets to be sent before the WPA authentication is completed. This can be exploited to gain knowledge of certain sensitive information, which may be leveraged for further attacks. The vulnerabilities are reported in versions prior to 0.9.3. Solution: Update to version 0.9.3. Provided and/or discovered by: 1) kurth 2, 3) Reported by the vendor.
Последним его собирал taf@, у меня уже и карточки поломались на Atheros.
lakostis@ обновил kernel-source-madwifi до версии 0.9.3.1 23 мая.