CVE-2013-4579

MEDIUM

Description

The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations.

References

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729573

http://www.mathyvanhoef.com/2013/11/unmasking-spoofed-mac-address.html

http://www.openwall.com/lists/oss-security/2013/11/15/3

http://www.ubuntu.com/usn/USN-2113-1

http://www.ubuntu.com/usn/USN-2117-1

http://www.ubuntu.com/usn/USN-2133-1

http://www.ubuntu.com/usn/USN-2134-1

http://www.ubuntu.com/usn/USN-2135-1

http://www.ubuntu.com/usn/USN-2136-1

http://www.ubuntu.com/usn/USN-2138-1

http://www.ubuntu.com/usn/USN-2139-1

http://www.ubuntu.com/usn/USN-2141-1

https://lists.ath9k.org/pipermail/ath9k-devel/2013-November/012215.html

Details

Source: MITRE

Published: 2013-11-20

Updated: 2014-03-16

Type: CWE-310

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM