Home / mailings Gentoo-announce
Posted on 18 April 2007
Gentoo-announce--SNIs70sCzqvszXB4Content-Type: text/plain; charset=us-asciiContent-Disposition: inline- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Gentoo Linux Security Advisory GLSA 200704-15- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: MadWifi: Multiple vulnerabilities Date: April 17, 2007 Bugs: #173434 ID: 200704-15- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -Synopsis========Multiple vulnerabilities have been discovered in the MadWifi driver,possibly leading to a Denial of Service and information disclosure.Background==========The MadWifi driver provides support for Atheros based IEEE 802.11Wireless Lan cards.Affected packages================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-wireless/madwifi-ng < 0.9.3 >= 0.9.3Description===========The driver does not properly process Channel Switch AnnouncementInformation Elements, allowing for an abnormal channel change. Theieee80211_input() function does not properly handle AUTH frames and thedriver sends unencrypted packets before WPA authentication succeeds.Impact======A remote attacker could send specially crafted AUTH frames to thevulnerable host, resulting in a Denial of Service by crashing thekernel. A remote attacker could gain access to sensitive informationabout network architecture by sniffing unencrypted packets. A remoteattacker could also send a Channel Switch Count less than or equal toone to trigger a channel change, resulting in a communication loss anda Denial of Service.Workaround==========There is no known workaround at this time.Resolution==========All MadWifi users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3"References========== [ 1 ] CVE-2007-7178 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7178 [ 2 ] CVE-2007-7179 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7179 [ 3 ] CVE-2007-7180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7180Availability============This GLSA and any updates to it are available for viewing atthe Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200704-15.xmlConcerns?=========Security is a primary focus of Gentoo Linux and ensuring theconfidentiality and security of our users machines is of utmostimportance to us. Any security concerns should be addressed tosecurity@gentoo.org or alternatively, you may file a bug athttp://bugs.gentoo.org.License=======Copyright 2007 Gentoo Foundation, Inc; referenced textbelongs to its owner(s).The contents of this document are licensed under theCreative Commons - Attribution / Share Alike license.http://creativecommons.org/licenses/by-sa/2.5--SNIs70sCzqvszXB4Content-Type: application/pgp-signatureContent-Disposition: inline