Bug#446824: CVE-2007-5448 remote denial of service via crafted beacon frame
Nico Golde
nion at debian.org
Tue Oct 16 15:52:11 UTC 2007
Hi Kel,
* Kel Modderman <kel at otaku42.de> [2007-10-16 17:14]:
> tags 446824 pending
> thanks
>
> On Tue, 16 Oct 2007 08:37:31 am Nico Golde wrote:
> > | Madwifi 0.9.3.2 and earlier allows remote attackers to cause a denial
> > | of service (panic) via a beacon frame with a large length value in the
> > | extended supported rates (xrates) element, which triggers an assertion
> > | error, related to net80211/ieee80211_scan_ap.c and
> > | net80211/ieee80211_scan_sta.c.
>
> net80211/ieee80211_scan_ap.c in not vulnerable in any stable release from
> madwifi.org[0], the CVE is slightly misleading in regards to that detail.
Well I never said it is :) But thanks for the information, I
checked this and added it as not-affected to the security
tracker.
> Package awaiting sponsorship.
If you need a sponsor contact my by private mail I can
sponsor this for you.
Kind regards
Nico
--
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-madwifi-maintainers/attachments/20071016/3feef266/attachment-0001.pgp
More information about the Pkg-madwifi-maintainers
mailing list