FKIE_CVE-2007-2830

Vulnerability from fkie_nvd - Published: 2007-05-24 02:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
The ath_beacon_config function in if_ath.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system crash) via crafted beacon interval information when scanning for access points, which triggers a divide-by-zero error.
References
cve@mitre.orghttp://madwifi.org/ticket/1270Patch
cve@mitre.orghttp://madwifi.org/wiki/SecurityPatch
cve@mitre.orghttp://osvdb.org/36636
cve@mitre.orghttp://secunia.com/advisories/25339
cve@mitre.orghttp://secunia.com/advisories/25622
cve@mitre.orghttp://secunia.com/advisories/25763
cve@mitre.orghttp://secunia.com/advisories/25861
cve@mitre.orghttp://secunia.com/advisories/26083
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200706-04.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:132
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_14_sr.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/470674/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/24114
cve@mitre.orghttp://www.ubuntu.com/usn/usn-479-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1919
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/34451
af854a3a-2127-422b-91ae-364da2661108http://madwifi.org/ticket/1270Patch
af854a3a-2127-422b-91ae-364da2661108http://madwifi.org/wiki/SecurityPatch
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/36636
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25339
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25622
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25763
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25861
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26083
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200706-04.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:132
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_14_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/470674/100/100/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24114
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-479-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1919
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/34451
Impacted products
Vendor Product Version
madwifi madwifi *
madwifi madwifi 0.9.0
madwifi madwifi 0.9.1
madwifi madwifi 0.9.2
madwifi madwifi 0.9.2.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:madwifi:madwifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D52DDD74-8FED-45AD-AF38-9ECEA2DE07C3",
              "versionEndIncluding": "0.9.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:madwifi:madwifi:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADB6BFE-CEB2-4DFD-AB76-7A47708997AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:madwifi:madwifi:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A2309CA-C570-4994-A25C-452762651E73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:madwifi:madwifi:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA6E66DE-5EF4-4772-ADCB-98DA4C8D4521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:madwifi:madwifi:0.9.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B84A9-47AC-404A-A7D7-91EEA8BAB6D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The ath_beacon_config function in if_ath.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system crash) via crafted beacon interval information when scanning for access points, which triggers a divide-by-zero error."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n ath_beacon_config en if_ath.c de MadWifi anterior a 0.9.3.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del sistema) mediante informaci\u00f3n manipulada de un intervalo de paquete de baliza (beacon interval) al escanear para encontrar puntos de acceso, lo cual provoca un error de divisi\u00f3n por cero."
    }
  ],
  "id": "CVE-2007-2830",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-24T02:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://madwifi.org/ticket/1270"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://madwifi.org/wiki/Security"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/36636"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25339"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25622"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25763"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25861"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26083"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200706-04.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:132"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/470674/100/100/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24114"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-479-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1919"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://madwifi.org/ticket/1270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://madwifi.org/wiki/Security"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/36636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25339"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25622"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25763"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200706-04.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:132"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/470674/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-479-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34451"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…