Bug 346341 (CVE-2007-4997) - CVE-2007-4997 kernel ieee80211 off-by-two integer underflow
Summary: CVE-2007-4997 kernel ieee80211 off-by-two integer underflow
Alias: CVE-2007-4997
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Depends On: 346361 346381 346391 346401
TreeView+ depends on / blocked
Reported: 2007-10-23 07:43 UTC by Mark J. Cox
Modified: 2023-05-12 11:50 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2015-08-24 15:38:37 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0993 0 normal SHIPPED_LIVE Important: kernel security update 2007-11-29 14:46:49 UTC
Red Hat Product Errata RHSA-2007:1104 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2007-12-19 18:33:17 UTC

Description Mark J. Cox 2007-10-23 07:43:24 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-4997 to the following vulnerability:

** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.


Comment 1 Mark J. Cox 2007-10-23 07:45:05 UTC
Chris Evans discovered that a malicious 80211 frame can crash machine if certain
drivers, chipsets, and firmware is in use.  


eported by Chris Evans <scarybeasts>:

> The summary is that an evil 80211 frame can crash out a victim's
> machine. It only applies to drivers using the 80211 wireless code, and
> only then to certain drivers (and even then depends on a card's
> firmware not dropping a dubious packet). I must confess I'm not
> keeping track of Linux wireless support, and the different protocol
> stacks etc.
> Details are as follows:
> ieee80211_rx() does not explicitly check that "skb->len >= hdrlen".
> There are other skb->len checks, but not enough to prevent a subtle
> off-by-two error if the frame has the IEEE80211_STYPE_QOS_DATA flag
> set.
> This leads to integer underflow and crash here:
> if (frag != 0)
>    flen -= hdrlen;
> (flen is subsequently used as a memcpy length parameter).


Red Hat would like to credit Chris Evans for reporting this issue.

Comment 3 Jonathan Larmour 2007-10-23 09:06:07 UTC
I should not be on this bug.

Comment 4 Mark J. Cox 2007-11-08 18:19:09 UTC
Now also public at http://scary.beasts.org/security/CESA-2007-007.html

Note You need to log in before you can comment on or make changes to this bug.