Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58410
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2007:132 (madwifi-source)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to madwifi-source
announced via advisory MDKSA-2007:132.

The 802.11 network stack in MadWifi prior to 0.9.3.1 would alloa remote
attackers to cause a denial of service (system hang) via a crafted
length field in nested 802.3 Ethernet frames in Fast Frame packets,
which results in a NULL pointer dereference (CVE-2007-2829).

The ath_beacon_config function in MadWifi prior to 0.9.3.1 would
allow a remote attacker to cause a denial of service (system crash)
via crafted beacon interval information when scanning for access
points, which triggered a divide-by-zero error (CVE-2007-2830).

An array index error in MadWifi prior to 0.9.3.1 would allow a
local user to cause a denial of service (system crash) and possibly
obtain kerenl memory contents, as well as possibly allowing for the
execution of arbitrary code via a large negative array index value
(CVE-2007-2831).

Updated packages have been updated to 0.9.3.1 to correct these
issues. Wpa_supplicant is built using madwifi-source and has been
rebuilt using 0.9.3.1 source.

Affected: 2007.0, 2007.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2007:132

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2829
BugTraq ID: 24114
http://www.securityfocus.com/bid/24114
Bugtraq: 20070606 FLEA-2007-0021-2: madwifi (Google Search)
http://www.securityfocus.com/archive/1/470674/100/100/threaded
http://security.gentoo.org/glsa/glsa-200706-04.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:132
http://osvdb.org/36635
http://secunia.com/advisories/25339
http://secunia.com/advisories/25622
http://secunia.com/advisories/25763
http://secunia.com/advisories/25861
http://secunia.com/advisories/26083
SuSE Security Announcement: SUSE-SR:2007:014 (Google Search)
http://www.novell.com/linux/security/advisories/2007_14_sr.html
http://www.ubuntu.com/usn/usn-479-1
http://www.vupen.com/english/advisories/2007/1919
XForce ISS Database: madwifi-fastframe-dos(34455)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34455
Common Vulnerability Exposure (CVE) ID: CVE-2007-2830
http://osvdb.org/36636
XForce ISS Database: madwifi-athbeaconconfig-dos(34451)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34451
Common Vulnerability Exposure (CVE) ID: CVE-2007-2831
http://osvdb.org/36637
XForce ISS Database: madwifi-ieee80211ioctlgetwmmparams-dos(34453)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34453
Common Vulnerability Exposure (CVE) ID: CVE-2006-2830
BugTraq ID: 18301
http://www.securityfocus.com/bid/18301
CERT/CC vulnerability note: VU#999884
http://www.kb.cert.org/vuls/id/999884
http://securitytracker.com/id?1016145
http://secunia.com/advisories/20452
http://www.vupen.com/english/advisories/2006/2155
XForce ISS Database: tibco-rendezvous-admin-bo(26939)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26939
Common Vulnerability Exposure (CVE) ID: CVE-2006-2831
BugTraq ID: 18245
http://www.securityfocus.com/bid/18245
Bugtraq: 20060602 [DRUPAL-SA-2006-007] Drupal 4.6.8 / 4.7.2 fixes arbitrary file execution issue (Google Search)
http://www.securityfocus.com/archive/1/435792/100/0/threaded
Debian Security Information: DSA-1125 (Google Search)
http://www.debian.org/security/2006/dsa-1125
http://secunia.com/advisories/21244
http://securityreason.com/securityalert/1042
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.