ID CVE-2006-7179
Summary ieee80211_input.c in MadWifi before 0.9.3 does not properly process Channel Switch Announcement Information Elements (CSA IEs), which allows remote attackers to cause a denial of service (loss of communication) via a Channel Switch Count less than or equal to one, triggering a channel change.
References
Vulnerable Configurations
  • cpe:2.3:a:madwifi:madwifi:*:*:*:*:*:*:*:*
    cpe:2.3:a:madwifi:madwifi:*:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 16-10-2018 - 16:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
refmap via4
bid 23436
bugtraq 20070423 FLEA-2007-0012-1: madwifi
confirm
gentoo GLSA-200704-15
mandriva MDKSA-2007:082
misc http://dev.lintrack.org/ticket/101
osvdb 34645
secunia
  • 24670
  • 24841
  • 24931
  • 25861
  • 26083
suse SUSE-SR:2007:014
ubuntu USN-479-1
vupen ADV-2007-1187
statements via4
contributor Mark J Cox
lastmodified 2007-04-17
organization Red Hat
statement Not vulnerable. The MadWiFi wireless driver is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
Last major update 16-10-2018 - 16:29
Published 30-03-2007 - 01:19
Last modified 16-10-2018 - 16:29
Back to Top