MADWiFi Linux Kernel Device Driver Multiple Remote Buffer Overflow Vulnerabilities

The MADWiFi device driver is prone to multiple remote stack-based buffer-overflow vulnerabilities because the software fails to do proper bounds-checking of user-supplied data before copying it to an insufficiently sized memory buffer.

These issues affect only computers with the vulnerable device driver compiled, installed, and enabled on Linux operating systems. Also, victims must be running a local application to scan available access points for the return packets.

A remote attacker may exploit these issues to cause denial-of-service conditions or to possibly execute arbitrary code in the context of the affected kernel. Successful exploits can result in a complete compromise of affected computers.

Versions of the MADWiFi device driver prior to are vulnerable.


Privacy Statement
Copyright 2010, SecurityFocus