blob: 0bbc66b42ed73117099982486c3cd0084ec81e75 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
|
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200907-08">
<title>Multiple Ralink wireless drivers: Execution of arbitrary code</title>
<synopsis>
An integer overflow in multiple Ralink wireless drivers might lead to the
execution of arbitrary code with elevated privileges.
</synopsis>
<product type="ebuild">rt2400 rt2500 rt2570 rt61 ralink-rt61</product>
<announced>2009-07-12</announced>
<revised count="01">2009-07-12</revised>
<bug>257023</bug>
<access>remote</access>
<affected>
<package name="net-wireless/rt2400" auto="yes" arch="*">
<vulnerable range="le">1.2.2_beta3</vulnerable>
</package>
<package name="net-wireless/rt2500" auto="yes" arch="*">
<vulnerable range="le">1.1.0_pre2007071515</vulnerable>
</package>
<package name="net-wireless/rt2570" auto="yes" arch="*">
<vulnerable range="le">20070209</vulnerable>
</package>
<package name="net-wireless/rt61" auto="yes" arch="*">
<vulnerable range="le">1.1.0_beta2</vulnerable>
</package>
<package name="net-wireless/ralink-rt61" auto="yes" arch="*">
<vulnerable range="le">1.1.1.0</vulnerable>
</package>
</affected>
<background>
<p>
All listed packages are external kernel modules that provide drivers
for multiple Ralink devices. ralink-rt61 is released by ralinktech.com,
the other packages by the rt2x00.serialmonkey.com project.
</p>
</background>
<description>
<p>
Aviv reported an integer overflow in multiple Ralink wireless card
drivers when processing a probe request packet with a long SSID,
possibly related to an integer signedness error.
</p>
</description>
<impact type="high">
<p>
A physically proximate attacker could send specially crafted packets to
a user who has wireless networking enabled, possibly resulting in the
execution of arbitrary code with root privileges.
</p>
</impact>
<workaround>
<p>
Unload the kernel modules.
</p>
</workaround>
<resolution>
<p>
All external kernel modules have been masked and we recommend that
users unmerge those drivers. The Linux mainline kernel has equivalent
support for these devices and the vulnerability has been resolved in
stable versions of sys-kernel/gentoo-sources.
</p>
<code>
# emerge --unmerge "net-wireless/rt2400"
# emerge --unmerge "net-wireless/rt2500"
# emerge --unmerge "net-wireless/rt2570"
# emerge --unmerge "net-wireless/rt61"
# emerge --unmerge "net-wireless/ralink-rt61"</code>
</resolution>
<references>
<uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0282">CVE-2009-0282</uri>
</references>
<metadata tag="requester" timestamp="2009-07-09T18:18:38Z">
rbu
</metadata>
<metadata tag="submitter" timestamp="2009-07-09T18:30:24Z">
rbu
</metadata>
<metadata tag="bugReady" timestamp="2009-07-12T15:41:07Z">
rbu
</metadata>
</glsa>
|