This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
The 802.11 network stack in MadWifi prior to 0.9.3.1 would alloa
remote attackers to cause a denial of service (system hang) via a
crafted length field in nested 802.3 Ethernet frames in Fast Frame
packets, which results in a NULL pointer dereference (CVE-2007-2829).
The ath_beacon_config function in MadWifi prior to 0.9.3.1 would allow
a remote attacker to cause a denial of service (system crash) via
crafted beacon interval information when scanning for access points,
which triggered a divide-by-zero error (CVE-2007-2830).
An array index error in MadWifi prior to 0.9.3.1 would allow a local
user to cause a denial of service (system crash) and possibly obtain
kerenl memory contents, as well as possibly allowing for the execution
of arbitrary code via a large negative array index value
Updated packages have been updated to 0.9.3.1 to correct these issues.
Wpa_supplicant is built using madwifi-source and has been rebuilt
using 0.9.3.1 source.
Update the affected madwifi-source, wpa_gui and / or wpa_supplicant
Risk factor :
Critical / CVSS Base Score : 10.0