Vulnerability Name: | CVE-2005-4835 (CCN-14686) | ||||||||
Assigned: | 2005-11-08 | ||||||||
Published: | 2005-11-08 | ||||||||
Updated: | 2008-09-10 | ||||||||
Summary: | The ath_rate_sample function in the ath_rate/sample/sample.c sample code in MadWifi before 0.9.3 allows remote attackers to cause a denial of service (failed KASSERT and system crash) by moving a connected system to a location with low signal strength, and possibly other vectors related to a race condition between interface enabling and packet transmission. | ||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C) 5.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Denial of Service | ||||||||
References: | Source: MITRE Type: CNA CVE-2005-4835 Source: CCN Type: MadWifi Ticket #162 Ticket #162 (new defect): failed assertion in rate-sample, race condition bringing interfaces up Source: MISC Type: UNKNOWN http://madwifi.org/ticket/162 Source: CCN Type: MadWifi Ticket #279 Ticket #279 (new defect): kernel oops at ath_rate_findrate with kernel 2.6.14.5 Source: MISC Type: UNKNOWN http://madwifi.org/ticket/279 Source: CCN Type: MadWifi Ticket #287 Ticket #287 (closed defect: fixed): kernel panic from sample code Source: CONFIRM Type: UNKNOWN http://madwifi.org/ticket/287 Source: CCN Type: MadWifi Web site Release v.0.9.3 Source: CONFIRM Type: Patch http://madwifi.org/wiki/Releases/0.9.3 Source: SECUNIA Type: UNKNOWN 24841 Source: SECUNIA Type: UNKNOWN 26083 Source: MANDRIVA Type: UNKNOWN MDKSA-2007:082 Source: SUSE Type: UNKNOWN SUSE-SR:2007:014 Source: CCN Type: OSVDB ID: 43551 MadWifi ath_rate/sample/sample.c ath_rate_sample Function Remote DoS Source: XF Type: UNKNOWN madwifi-athratesample-dos(14686) Source: SUSE Type: SUSE-SR:2007:014 SUSE Security Summary Report | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |