ID CVE-2005-4835
Summary The ath_rate_sample function in the ath_rate/sample/sample.c sample code in MadWifi before 0.9.3 allows remote attackers to cause a denial of service (failed KASSERT and system crash) by moving a connected system to a location with low signal strength, and possibly other vectors related to a race condition between interface enabling and packet transmission.
References
Vulnerable Configurations
  • cpe:2.3:a:madwifi:madwifi:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:madwifi:madwifi:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:madwifi:madwifi:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:madwifi:madwifi:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:madwifi:madwifi:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:madwifi:madwifi:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:madwifi:madwifi:0.9.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:madwifi:madwifi:0.9.2.1:*:*:*:*:*:*:*
CVSS
Base: 7.1 (as of 10-09-2008 - 19:54)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:C
refmap via4
confirm
mandriva MDKSA-2007:082
misc
secunia
  • 24841
  • 26083
suse SUSE-SR:2007:014
statements via4
contributor Mark J Cox
lastmodified 2007-04-17
organization Red Hat
statement Not vulnerable. The MadWiFi wireless driver is not shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.
Last major update 10-09-2008 - 19:54
Published 31-12-2005 - 05:00
Last modified 10-09-2008 - 19:54
Back to Top