blob: b229a58a3e5a5efc3bb9d7179b6dba0ee6196262 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200711-09">
<title>MadWifi: Denial of Service</title>
MadWifi does not correctly process beacon frames which can lead to a
remotely triggered Denial of Service.
<product type="ebuild">madwifi-ng</product>
<announced>November 07, 2007</announced>
<revised>November 07, 2007: 01</revised>
<package name="net-wireless/madwifi-ng" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
The MadWifi driver provides support for Atheros based IEEE 802.11
Wireless Lan cards.
Clemens Kolbitsch and Sylvester Keil reported an error when processing
beacon frames with an overly large "length" value in the "xrates"
<impact type="normal">
A remote attacker could act as an access point and send a specially
crafted packet to an Atheros based wireless client, possibly resulting
in a Denial of Service (kernel panic).
There is no known workaround at this time.
All MadWifi users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-wireless/madwifi-ng-;</code>
<uri link="">CVE-2007-5448</uri>
<metadata tag="requester" timestamp="Fri, 02 Nov 2007 23:16:45 +0000">
<metadata tag="submitter" timestamp="Sat, 03 Nov 2007 23:18:04 +0000">
<metadata tag="bugReady" timestamp="Sat, 03 Nov 2007 23:18:55 +0000">