Home / vulnerabilitiesPDF  

MDVSA-2008-007.txt

Posted on 11 January 2008
Source : packetstormsecurity.org Link

 


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:007
http://www.mandriva.com/security/
_______________________________________________________________________

Package : madwifi-source
Date : January 10, 2008
Affected: 2007.0, 2007.1, 2008.0
_______________________________________________________________________

Problem Description:

MadWifi prior to 0.9.3.3 allowed remote attackers to cause a denial
of service (panic) via a beacon frame with a large length value in
the extended supported rates (xrates) element, which would trigger
an assertion error.

Updated packages have been updated to 0.9.3.3 to correct this
issue. Wpa_supplicant is built using madwifi-source and has been
rebuilt using 0.9.3.3 source.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5448
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
994e5a529757654404fe20c659f01a81 2007.0/i586/madwifi-source-0.9.3.3-1.1mdv2007.0.noarch.rpm
96337298e1b19ebf0680b704bb37aabc 2007.0/i586/wpa_gui-0.5.5-2.3mdv2007.0.i586.rpm
b71e1f08dcecac80668c1e6486ef85e8 2007.0/i586/wpa_supplicant-0.5.5-2.3mdv2007.0.i586.rpm
e228e88670cae478d7f025013e21d487 2007.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.0.src.rpm
ca8ad7710dc3f8f3a659de1c480b7f4a 2007.0/SRPMS/wpa_supplicant-0.5.5-2.3mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
9474e50b228b594ed8a8ee31d85c2a13 2007.0/x86_64/madwifi-source-0.9.3.3-1.1mdv2007.0.noarch.rpm
d0fab326d4ebcccb814e7afc78c62023 2007.0/x86_64/wpa_gui-0.5.5-2.3mdv2007.0.x86_64.rpm
2b8ea9b48f395ff7f407774444989dfc 2007.0/x86_64/wpa_supplicant-0.5.5-2.3mdv2007.0.x86_64.rpm
e228e88670cae478d7f025013e21d487 2007.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.0.src.rpm
ca8ad7710dc3f8f3a659de1c480b7f4a 2007.0/SRPMS/wpa_supplicant-0.5.5-2.3mdv2007.0.src.rpm

Mandriva Linux 2007.1:
f7e6a1f9fcf31eace993c3732fff56e2 2007.1/i586/madwifi-source-0.9.3.3-1.1mdv2007.1.noarch.rpm
8be4e877f8f1302312fc8e87204099c0 2007.1/i586/wpa_gui-0.5.7-1.3mdv2007.1.i586.rpm
11e5d5478132946e0ba0af05b4a95d93 2007.1/i586/wpa_supplicant-0.5.7-1.3mdv2007.1.i586.rpm
dfdd7c77a9613d4617581202835dae8b 2007.1/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.1.src.rpm
6d3ac2467ad746a431cb7ba29d223490 2007.1/SRPMS/wpa_supplicant-0.5.7-1.3mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
1d02ba56908361b47b734744037aacf9 2007.1/x86_64/madwifi-source-0.9.3.3-1.1mdv2007.1.noarch.rpm
51a6280d852c1a0cdd7068e79138e4ac 2007.1/x86_64/wpa_gui-0.5.7-1.3mdv2007.1.x86_64.rpm
56666aee7b298754788cfdbd983b9fdb 2007.1/x86_64/wpa_supplicant-0.5.7-1.3mdv2007.1.x86_64.rpm
dfdd7c77a9613d4617581202835dae8b 2007.1/SRPMS/madwifi-source-0.9.3.3-1.1mdv2007.1.src.rpm
6d3ac2467ad746a431cb7ba29d223490 2007.1/SRPMS/wpa_supplicant-0.5.7-1.3mdv2007.1.src.rpm

Mandriva Linux 2008.0:
e854f61c347877fd0ee65bc2c0218337 2008.0/i586/madwifi-source-0.9.3.3-1.1mdv2008.0.noarch.rpm
e04b222093d69d2049c7439dd2e806b1 2008.0/i586/wpa_gui-0.6.0-1.2mdv2008.0.i586.rpm
e43ac8caaada63eeaacf980eebe14ceb 2008.0/i586/wpa_supplicant-0.6.0-1.2mdv2008.0.i586.rpm
a2aa4eb6917a165427de69725064e8b7 2008.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2008.0.src.rpm
fd704402aad00c89cc23d22a78e892c4 2008.0/SRPMS/wpa_supplicant-0.6.0-1.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
90194015eb52160071fd74743ef6c198 2008.0/x86_64/madwifi-source-0.9.3.3-1.1mdv2008.0.noarch.rpm
f041b8320f9f363b58d3c548312151b0 2008.0/x86_64/wpa_gui-0.6.0-1.2mdv2008.0.x86_64.rpm
3f76dbf8e0758bd949713f224142038c 2008.0/x86_64/wpa_supplicant-0.6.0-1.2mdv2008.0.x86_64.rpm
a2aa4eb6917a165427de69725064e8b7 2008.0/SRPMS/madwifi-source-0.9.3.3-1.1mdv2008.0.src.rpm
fd704402aad00c89cc23d22a78e892c4 2008.0/SRPMS/wpa_supplicant-0.6.0-1.2mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHhte0mqjQ0CJFipgRArqpAJ99VOakpyKJ/pl5N59yBHqOFBmPsACfVQ96
C1t/vXtXiFg1QtY3/73pZTw=
=hRSd
-----END PGP SIGNATURE-----

 

TOP