Joined: 12 May 2004
|Posted: Wed Apr 18, 2007 1:26 am Post subject: [ GLSA 200704-15 ] MadWifi: Multiple vulnerabilities
|Gentoo Linux Security Advisory
Title: MadWifi: Multiple vulnerabilities (GLSA 200704-15)
Date: April 17, 2007
Updated: April 21, 2007
Multiple vulnerabilities have been discovered in the MadWifi driver, possibly leading to a Denial of Service and information disclosure.
The MadWifi driver provides support for Atheros based IEEE 802.11 Wireless Lan cards.
Vulnerable: < 0.9.3
Unaffected: >= 0.9.3
Architectures: All supported architectures
The driver does not properly process Channel Switch Announcement Information Elements, allowing for an abnormal channel change. The ieee80211_input() function does not properly handle AUTH frames and the driver sends unencrypted packets before WPA authentication succeeds.
A remote attacker could send specially crafted AUTH frames to the vulnerable host, resulting in a Denial of Service by crashing the kernel. A remote attacker could gain access to sensitive information about network architecture by sniffing unencrypted packets. A remote attacker could also send a Channel Switch Count less than or equal to one to trigger a channel change, resulting in a communication loss and a Denial of Service.
There is no known workaround at this time.
All MadWifi users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3"
Last edited by GLSA on Sun Apr 22, 2007 4:18 am; edited 1 time in total