Total
10 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2006-7180 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 6.8 MEDIUM | N/A |
ieee80211_output.c in MadWifi before 0.9.3 sends unencrypted packets before WPA authentication succeeds, which allows remote attackers to obtain sensitive information (related to network structure), and possibly cause a denial of service (disrupted authentication) and conduct spoofing attacks. | |||||
CVE-2007-2830 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 5.0 MEDIUM | N/A |
The ath_beacon_config function in if_ath.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system crash) via crafted beacon interval information when scanning for access points, which triggers a divide-by-zero error. | |||||
CVE-2006-7177 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 7.8 HIGH | N/A |
MadWifi, when Ad-Hoc mode is used, allows remote attackers to cause a denial of service (system crash) via unspecified vectors that lead to a kernel panic in the ieee80211_input function, related to "packets coming from a 'malicious' WinXP system." | |||||
CVE-2006-6332 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 7.5 HIGH | N/A |
Stack-based buffer overflow in net80211/ieee80211_wireless.c in MadWifi before 0.9.2.1 allows remote attackers to execute arbitrary code via unspecified vectors, related to the encode_ie and giwscan_cb functions. | |||||
CVE-2007-2829 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 5.0 MEDIUM | N/A |
The 802.11 network stack in net80211/ieee80211_input.c in MadWifi before 0.9.3.1 allows remote attackers to cause a denial of service (system hang) via a crafted length field in nested 802.3 Ethernet frames in Fast Frame packets, which results in a NULL pointer dereference. | |||||
CVE-2006-7179 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 7.8 HIGH | N/A |
ieee80211_input.c in MadWifi before 0.9.3 does not properly process Channel Switch Announcement Information Elements (CSA IEs), which allows remote attackers to cause a denial of service (loss of communication) via a Channel Switch Count less than or equal to one, triggering a channel change. | |||||
CVE-2006-7178 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 7.8 HIGH | N/A |
MadWifi before 0.9.3 does not properly handle reception of an AUTH frame by an IBSS node, which allows remote attackers to cause a denial of service (system crash) via a certain AUTH frame. | |||||
CVE-2007-2831 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 10.0 HIGH | N/A |
Array index error in the (1) ieee80211_ioctl_getwmmparams and (2) ieee80211_ioctl_setwmmparams functions in net80211/ieee80211_wireless.c in MadWifi before 0.9.3.1 allows local users to cause a denial of service (system crash), possibly obtain kernel memory contents, and possibly execute arbitrary code via a large negative array index value. | |||||
CVE-2007-5448 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 4.3 MEDIUM | N/A |
Madwifi 0.9.3.2 and earlier allows remote attackers to cause a denial of service (panic) via a beacon frame with a large length value in the extended supported rates (xrates) element, which triggers an assertion error, related to net80211/ieee80211_scan_ap.c and net80211/ieee80211_scan_sta.c. | |||||
CVE-2005-4835 | 1 Madwifi | 1 Madwifi | 2024-02-04 | 7.1 HIGH | N/A |
The ath_rate_sample function in the ath_rate/sample/sample.c sample code in MadWifi before 0.9.3 allows remote attackers to cause a denial of service (failed KASSERT and system crash) by moving a connected system to a location with low signal strength, and possibly other vectors related to a race condition between interface enabling and packet transmission. |