Gentoo Archives: gentoo-announce

From: Raphael Marichez <falco@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200704-15 ] MadWifi: Multiple vulnerabilities
Date: Tue, 17 Apr 2007 22:56:52
Message-Id: 20070417223648.GI6214@falco.falcal.net
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200704-15
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: MadWifi: Multiple vulnerabilities
9 Date: April 17, 2007
10 Bugs: #173434
11 ID: 200704-15
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been discovered in the MadWifi driver,
19 possibly leading to a Denial of Service and information disclosure.
20
21 Background
22 ==========
23
24 The MadWifi driver provides support for Atheros based IEEE 802.11
25 Wireless Lan cards.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 net-wireless/madwifi-ng < 0.9.3 >= 0.9.3
34
35 Description
36 ===========
37
38 The driver does not properly process Channel Switch Announcement
39 Information Elements, allowing for an abnormal channel change. The
40 ieee80211_input() function does not properly handle AUTH frames and the
41 driver sends unencrypted packets before WPA authentication succeeds.
42
43 Impact
44 ======
45
46 A remote attacker could send specially crafted AUTH frames to the
47 vulnerable host, resulting in a Denial of Service by crashing the
48 kernel. A remote attacker could gain access to sensitive information
49 about network architecture by sniffing unencrypted packets. A remote
50 attacker could also send a Channel Switch Count less than or equal to
51 one to trigger a channel change, resulting in a communication loss and
52 a Denial of Service.
53
54 Workaround
55 ==========
56
57 There is no known workaround at this time.
58
59 Resolution
60 ==========
61
62 All MadWifi users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3"
66
67 References
68 ==========
69
70 [ 1 ] CVE-2007-7178
71 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7178
72 [ 2 ] CVE-2007-7179
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7179
74 [ 3 ] CVE-2007-7180
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7180
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200704-15.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2007 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5