Vigil@nce: Linux kernel, denial of service of libertas
November 2008 by Vigil@nce
SYNTHESIS
An attacker can send a long WiFi answer in order to stop systems
with a Libertas device.
Gravity: 1/4
Consequences: denial of service of computer
Provenance: radio connection
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: medium (2/3)
Creation date: 20/11/2008
IMPACTED PRODUCTS
– Linux kernel
DESCRIPTION
Files in the drivers/net/wireless/libertas/ directory implements
the support of Libertas WiFi devices.
A 802.11 host periodically scans the network, and the access point
answers a Beacon (Probe Response) containing the SSID (Service Set
IDentifier) indicating the BSS (Basic Service Set).
The lbs_process_bss() function of the drivers/net/wireless/libertas/scan.c
file analyzes these answers. However, if the size of the SSID is
larger than 32 bytes, a buffer overflow occurs. This overflow does
not lead to code execution.
An attacker can therefore send a long WiFi answer in order to stop
systems with a Libertas device.
CHARACTERISTICS
Identifiers: CVE-2008-5134, VIGILANCE-VUL-8261