Your submission was sent successfully! Close

USN-404-1: MadWifi vulnerability

9 January 2007

MadWifi vulnerability

Releases

Details

Laurent Butti, Jerome Razniewski, and Julien Tinnes discovered that the
MadWifi wireless driver did not correctly check packet contents when
receiving scan replies. A remote attacker could send a specially
crafted packet and execute arbitrary code with root privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.10
  • linux-restricted-modules-2.6.17-10-powerpc64-smp - 2.6.17.7-10.1
  • linux-restricted-modules-2.6.17-10-386 - 2.6.17.7-10.1
  • linux-restricted-modules-2.6.17-10-sparc64-smp - 2.6.17.7-10.1
  • linux-restricted-modules-2.6.17-10-sparc64 - 2.6.17.7-10.1
  • linux-restricted-modules-2.6.17-10-powerpc - 2.6.17.7-10.1
  • linux-restricted-modules-2.6.17-10-generic - 2.6.17.7-10.1
  • linux-restricted-modules-2.6.17-10-powerpc-smp - 2.6.17.7-10.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

References