Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 281562 (CVE-2009-2844) - Kernel: cfg80211 cmp_ies() NULL pointer dereference DoS (CVE-2009-2844)
Summary: Kernel: cfg80211 cmp_ies() NULL pointer dereference DoS (CVE-2009-2844)
Status: RESOLVED FIXED
Alias: CVE-2009-2844
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://git.kernel.org/?p=linux/kernel...
Whiteboard: [ linux >= 2.6.30 < 2.6.30.5 ]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-08-15 10:08 UTC by Alex Legler (RETIRED)
Modified: 2013-09-15 19:56 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-15 10:08:15 UTC
Jon Oberheide <jon@oberheide.org> reported:

These pointers can be NULL, the is_mesh() case isn't ever hit in the current  kernel, but cmp_ies() can be hit under certain conditions.

PoC at http://jon.oberheide.org/files/cfg80211-remote-dos.c:

 *   The NULL pointer dereference is triggered if the victim scans and receives
 *   a beacon frame that does not contain a SSID IE and then receives another 
 *   one that does have a SSID IE.  Raw frame injection via LORCON is required 
 *   on the wireless interface.  This should only affect the 2.6.30 series.
Comment 1 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-08-19 09:40:56 UTC
CVE-2009-2844 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2844):
  cfg80211 in net/wireless/scan.c in the Linux kernel before 2.6.31-rc6
  allows remote attackers to cause a denial of service (crash) via a
  sequence of beacon frames in which one frame omits an SSID
  Information Element (IE) and the subsequent frame contains an SSID
  IE, which triggers a NULL pointer dereference in the cmp_ies
  function.  NOTE: a potential weakness in the is_mesh function was
  also address, but the relevant code was not reachable, so it is not a
  vulnerability.