Bug#446824: CVE-2007-5448 remote denial of service via crafted beacon frame

Nico Golde nion at debian.org
Tue Oct 16 17:01:24 UTC 2007


Hi,
* Nico Golde <nion at debian.org> [2007-10-16 17:59]:
> Hi Kel,
> * Kel Modderman <kel at otaku42.de> [2007-10-16 17:14]:
> > tags 446824 pending
> > thanks
> > 
> > On Tue, 16 Oct 2007 08:37:31 am Nico Golde wrote:
> > > | Madwifi 0.9.3.2 and earlier allows remote attackers to cause a denial
> > > | of service (panic) via a beacon frame with a large length value in the
> > > | extended supported rates (xrates) element, which triggers an assertion
> > > | error, related to net80211/ieee80211_scan_ap.c and
> > > | net80211/ieee80211_scan_sta.c.
> > 
> > net80211/ieee80211_scan_ap.c in not vulnerable in any stable release from 
> > madwifi.org[0], the CVE is slightly misleading in regards to that detail.
> 
> Well I never said it is :) But thanks for the information, I 
> checked this and added it as not-affected to the security 
> tracker.

Correction, I misunderstood you, thanks Moritz for pointing 
me to this. At least the code in ieee80211_scan_sta.c is 
vulnerable in the Debian versions if I don't miss anything.
Kind regards
Nico
-- 
Nico Golde - http://ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-madwifi-maintainers/attachments/20071016/af7824cb/attachment-0001.pgp 


More information about the Pkg-madwifi-maintainers mailing list