Your submission was sent successfully! Close

USN-404-1: MadWifi vulnerability

9 January 2007

MadWifi vulnerability



Laurent Butti, Jerome Razniewski, and Julien Tinnes discovered that the
MadWifi wireless driver did not correctly check packet contents when
receiving scan replies. A remote attacker could send a specially
crafted packet and execute arbitrary code with root privileges.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.10
  • linux-restricted-modules-2.6.17-10-powerpc64-smp -
  • linux-restricted-modules-2.6.17-10-386 -
  • linux-restricted-modules-2.6.17-10-sparc64-smp -
  • linux-restricted-modules-2.6.17-10-sparc64 -
  • linux-restricted-modules-2.6.17-10-powerpc -
  • linux-restricted-modules-2.6.17-10-generic -
  • linux-restricted-modules-2.6.17-10-powerpc-smp -

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.