FKIE_CVE-2007-5448

Vulnerability from fkie_nvd - Published: 2007-10-14 18:17 - Updated: 2025-04-09 00:30
Severity ?
Summary
Madwifi 0.9.3.2 and earlier allows remote attackers to cause a denial of service (panic) via a beacon frame with a large length value in the extended supported rates (xrates) element, which triggers an assertion error, related to net80211/ieee80211_scan_ap.c and net80211/ieee80211_scan_sta.c.
References
cve@mitre.orghttp://bugs.gentoo.org/show_bug.cgi?id=195705
cve@mitre.orghttp://madwifi.org/changeset/2736Patch
cve@mitre.orghttp://secunia.com/advisories/27197Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27541
cve@mitre.orghttp://secunia.com/advisories/28431
cve@mitre.orghttp://securityreason.com/securityalert/3225
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200711-09.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:007
cve@mitre.orghttp://www.sec-consult.com/298.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/482168/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/26052
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3493
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/37182
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=195705
af854a3a-2127-422b-91ae-364da2661108http://madwifi.org/changeset/2736Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27197Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27541
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28431
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3225
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200711-09.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:007
af854a3a-2127-422b-91ae-364da2661108http://www.sec-consult.com/298.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/482168/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26052
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3493
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/37182
Impacted products
Vendor Product Version
madwifi madwifi *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:madwifi:madwifi:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "817F054B-BF7F-4B2E-B2BF-E58D67A3B101",
              "versionEndIncluding": "0.9.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Madwifi 0.9.3.2 and earlier allows remote attackers to cause a denial of service (panic) via a beacon frame with a large length value in the extended supported rates (xrates) element, which triggers an assertion error, related to net80211/ieee80211_scan_ap.c and net80211/ieee80211_scan_sta.c."
    },
    {
      "lang": "es",
      "value": "Madwifi 0.9.3.2 y versiones anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (p\u00e1nico) mediante una trama de baliza con una valor de longitud largo en el elemento extended supported rates (xrates). que dispara una error de aserci\u00f3n, relativo a net80211/ieee80211_scan_ap.c y net80211/ieee80211_scan_sta.c."
    }
  ],
  "id": "CVE-2007-5448",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-10-14T18:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=195705"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://madwifi.org/changeset/2736"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27197"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27541"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28431"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3225"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-09.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:007"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.sec-consult.com/298.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/482168/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26052"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3493"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37182"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=195705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://madwifi.org/changeset/2736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27197"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27541"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3225"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-09.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.sec-consult.com/298.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/482168/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37182"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…