LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: Updated madwifi-source, wpa_supplicant packages fix vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake The ath_rate_sample function in the ath_rate/sample/sample.c sample code in MadWifi before 0.9.3 allows remote attackers to cause a denial of service (failed KASSERT and system crash) by moving a connected system to a location with low signal strength, and possibly other vectors related to a race condition between interface enabling and packet transmission. (CVE-2005-4835)
 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:082
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : madwifi-source
 Date    : April 11, 2007
 Affected: 2007.0, 2007.1
 _______________________________________________________________________
 
 Problem Description:
 
 The ath_rate_sample function in the ath_rate/sample/sample.c sample
 code in MadWifi before 0.9.3 allows remote attackers to cause a denial
 of service (failed KASSERT and system crash) by moving a connected
 system to a location with low signal strength, and possibly other
 vectors related to a race condition between interface enabling and
 packet transmission. (CVE-2005-4835)
 
 MadWifi, when Ad-Hoc mode is used, allows remote attackers to cause
 a denial of service (system crash) via unspecified vectors that lead
 to a kernel panic in the ieee80211_input function, related to packets
 coming from a malicious WinXP system. (CVE-2006-7177)
 
 MadWifi before 0.9.3 does not properly handle reception of an AUTH
 frame by an IBSS node, which allows remote attackers to cause a denial
 of service (system crash) via a certain AUTH frame. (CVE-2006-7178)
 
 ieee80211_input.c in MadWifi before 0.9.3 does not properly process
 Channel Switch Announcement Information Elements (CSA IEs), which
 allows remote attackers to cause a denial of service (loss of
 communication) via a Channel Switch Count less than or equal to one,
 triggering a channel change. (CVE-2006-7179)
 
 ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets
 before WPA authentication succeeds, which allows remote attackers
 to obtain sensitive information (related to network structure),
 and possibly cause a denial of service (disrupted authentication)
 and conduct spoofing attacks. (CVE-2006-7180)
 
 Updated packages have been updated to 0.9.3 to correct this
 issue. Wpa_supplicant is built using madwifi-source and has been
 rebuilt using 0.9.3 source.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4835
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7177
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7178
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7179
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7180
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2007.0:
 d7cbe028e271f0f8d774905558e74fdc  2007.0/i586/madwifi-source-0.9.3-1.1mdv2007.0.noarch.rpm
 904a90761313b1cc56d6a0ff0d477ad7  2007.0/i586/wpa_gui-0.5.5-2.1mdv2007.0.i586.rpm
 052bfcc81003cc8b6656434e4611a521  2007.0/i586/wpa_supplicant-0.5.5-2.1mdv2007.0.i586.rpm 
 aaec8f2686274bd944a2a0932180a91d  2007.0/SRPMS/madwifi-source-0.9.3-1.1mdv2007.0.src.rpm
 8b9dad3443aab464e3f32bdf6e5e4ab6  2007.0/SRPMS/wpa_supplicant-0.5.5-2.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 d7cbe028e271f0f8d774905558e74fdc  2007.0/x86_64/madwifi-source-0.9.3-1.1mdv2007.0.noarch.rpm
 286aebce2515abdf2ce786d568ca561a  2007.0/x86_64/wpa_gui-0.5.5-2.1mdv2007.0.x86_64.rpm
 b65aa19f1f3f3e54fe1417e01efa0618  2007.0/x86_64/wpa_supplicant-0.5.5-2.1mdv2007.0.x86_64.rpm 
 aaec8f2686274bd944a2a0932180a91d  2007.0/SRPMS/madwifi-source-0.9.3-1.1mdv2007.0.src.rpm
 8b9dad3443aab464e3f32bdf6e5e4ab6  2007.0/SRPMS/wpa_supplicant-0.5.5-2.1mdv2007.0.src.rpm

 Mandriva Linux 2007.1:
 b1516928d8a7912697ed745a4c7d7e92  2007.1/i586/madwifi-source-0.9.3-1.1mdv2007.1.noarch.rpm
 f8f1afbd019cee7198980cea27f51888  2007.1/i586/wpa_gui-0.5.7-1.1mdv2007.1.i586.rpm
 1b6c006280fc9e489367a33277aedec2  2007.1/i586/wpa_supplicant-0.5.7-1.1mdv2007.1.i586.rpm 
 5cfe8a50972bc71713aeec6e3fd16477  2007.1/SRPMS/madwifi-source-0.9.3-1.1mdv2007.1.src.rpm
 39d7ca78f1476cf4cc1e9424b839687d  2007.1/SRPMS/wpa_supplicant-0.5.7-1.1mdv2007.1.src.rpm

 Mandriva Linux 2007.1/X86_64:
 b1516928d8a7912697ed745a4c7d7e92  2007.1/x86_64/madwifi-source-0.9.3-1.1mdv2007.1.noarch.rpm
 f2d503a7c9c75a2e7a893bf9ac21b67d  2007.1/x86_64/wpa_gui-0.5.7-1.1mdv2007.1.x86_64.rpm
 cab5de7a034f25e3a1135ebb4baf540a  2007.1/x86_64/wpa_supplicant-0.5.7-1.1mdv2007.1.x86_64.rpm 
 5cfe8a50972bc71713aeec6e3fd16477  2007.1/SRPMS/madwifi-source-0.9.3-1.1mdv2007.1.src.rpm
 39d7ca78f1476cf4cc1e9424b839687d  2007.1/SRPMS/wpa_supplicant-0.5.7-1.1mdv2007.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.