Bug#446824: CVE-2007-5448 remote denial of service via crafted beacon frame

Nico Golde nion at debian.org
Tue Oct 16 15:52:11 UTC 2007


Hi Kel,
* Kel Modderman <kel at otaku42.de> [2007-10-16 17:14]:
> tags 446824 pending
> thanks
> 
> On Tue, 16 Oct 2007 08:37:31 am Nico Golde wrote:
> > | Madwifi 0.9.3.2 and earlier allows remote attackers to cause a denial
> > | of service (panic) via a beacon frame with a large length value in the
> > | extended supported rates (xrates) element, which triggers an assertion
> > | error, related to net80211/ieee80211_scan_ap.c and
> > | net80211/ieee80211_scan_sta.c.
> 
> net80211/ieee80211_scan_ap.c in not vulnerable in any stable release from 
> madwifi.org[0], the CVE is slightly misleading in regards to that detail.

Well I never said it is :) But thanks for the information, I 
checked this and added it as not-affected to the security 
tracker.

> Package awaiting sponsorship.

If you need a sponsor contact my by private mail I can 
sponsor this for you.
Kind regards
Nico
-- 
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-madwifi-maintainers/attachments/20071016/3feef266/attachment-0001.pgp 


More information about the Pkg-madwifi-maintainers mailing list