Security Vulnerablilites in the MadWifi Driver
This page intends to give an overview of security-related issues that have been reported in the past for MadWifi.
Current Status
2007-10-18: The current MadWifi release is v0.9.3.3, for which no security-related issues are known.
Past security issues
| CVE ID: | CVE- |
| Summary: | Allows remote attackers to cause a denial of service (panic) via a beacon frame with a large length value in the extended supported rates (xrates) element, which triggers an assertion error. |
| Confirmed by: | release announcement |
| Fixed in changeset: | r2724 (trunk), r2749 (releases/0.9.3) |
| Fixed in release: | v0.9.3.3 |
| CVE ID: | CVE- |
| Summary: | The beacon interval information that is gathered while scanning for Access Points is not properly validated. This could be exploited from remote to cause a DoS due to a "division by zero" exception. |
| Confirmed by: | #1270 |
| Fixed in changeset: | r2348 (trunk), r2366 (tags/release-0.9.3.1) |
| Fixed in release: | v0.9.3.1 |
| CVE ID: | CVE- |
| Summary: | The code which parses fast frames and 802.3 frames embedded therein does not properly validate the size parameters in such frames. This could be exploited from remote to cause a DoS due to a NULL-pointer dereference. |
| Confirmed by: | #1335 |
| Fixed in changeset: | r2296 (trunk), r2366 (tags/release-0.9.3.1) |
| Fixed in release: | v0.9.3.1 |
| CVE ID: | CVE- |
| Summary: | A restricted local user could pass invalid data to two ioctl handlers, causing a DoS due to access being made to invalid addresses. Chances are that this issue also might allow read and/or write access to kernel memory; this has not yet been verified. |
| Confirmed by: | #1334 |
| Fixed in changeset: | r2280 (trunk), r2366 (tags/release-0.9.3.1) |
| Fixed in release: | v0.9.3.1 |
| CVE ID: | CVE- |
| Summary: | ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets before WPA authentication succeeds, which allows remote attackers to obtain sensitive information (related to network structure), and possibly cause a denial of sevice (disrupted authentication) and conduct spoofing attacks. |
| Confirmed by: | #967 |
| Fixed in changeset: | r1760 |
| Fixed in release: | v0.9.3 |
| CVE ID: | CVE- |
| Summary: | ieee80211_input.c in MadWifi before 0.9.3 does not properly process Channel Switch Announcement Information Elements (CSA IEs), which allows remote attackers to cause a denial of service (loss of communication) via a Channel Switch Count less than or equal to one, triggering a channel change. |
| Confirmed by: | #963 |
| Fixed in changeset: | r1762 |
| Fixed in release: | v0.9.3 |
| CVE ID: | CVE- CVE- |
| Summary: | MadWifi before 0.9.3 does not properly handle reception of an AUTH frame by an IBSS node, which allows remote attackers to cause a denial of service (system crash) via a certain AUTH frame. MadWifi, when Ad-Hoc mode is used, allows remote attackers to cause a denial of service (system crash) via unspecified vectors that lead to a kernel panic in the ieee80211_input function, related to "packets coming from a 'malicious' WinXP system. |
| Confirmed by: | #880 |
| Fixed in changeset: | r1818 |
| Fixed in release: | v0.9.3 |
| CVE ID: | CVE- |
| Summary: | Stack-based buffer overflow in net80211/ieee80211_wireless.c in MadWifi before 0.9.2.1 allows remote attackers to execute arbitrary code via unspecified vectors, related to the encode_ie and giwscan_cb functions. |
| Confirmed by: | release-0-9-2-1-fixes-critical-security-issue |
| Fixed in changesets: | r1842 r1847 |
| Fixed in releases: | v0.9.3 v0.9.2.1 |
| CVE ID: | CVE- |
| Summary: | The ath_rate_sample function in the ath_rate/sample/sample.c sample code in MadWifi before 0.9.3 allows remote attackers to cause a denial of service (failed KASSERT and system crash) by moving a connected system to a location with low signal strength, and possibly other vectors related to a race condition between interface enabling and packet transmission. |
| Confirmed by: | #287 |
| Fixed in changeset: | before r1705 (see #287 for details) |
| Fixed in release: | v0.9.3 |