In association with heise online

07 December 2006, 20:18

Critical error in madwifi driver

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Versions of the madwifi driver (a Linux and BSD driver for WLAN cards with Atheros chips) prior to the current version 0.9.2 are, under certain circumstances, vulnerable to remote exploits. If it searches for access points in client mode, an attacker, pretending to be an AP, can inject external code via the wireless connection and execute it in the kernel context.

This works, for example, with madwifi itself, as the driver works in master mode as an AP as required. Because there is no workaround for the original stack overflow in two functions, the developers have released an interim bug-fixed version and advise users to update as soon as possible. The next regular version, 0.9.3, should be released at the end of next week.

See also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit