oss-sec mailing list archives
CVE request: ath9k_htc improperly updates MAC address
From: "Mathy Vanhoef" <Mathy.Vanhoef () cs kuleuven be>
Date: Thu, 14 Nov 2013 23:03:34 +0100
Hi, This concerns a bug in the ath9k_htc driver: When a user changes/spoofs their MAC address, an attacker can retrieve the original MAC address, which is a potential privacy risk. Debian bug report: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729573 Background of the bug: http://www.mathyvanhoef.com/2013/11/unmasking-spoofed-mac-address.html The cause of the bug is in ath9k_htc_set_bssid_mask [1]. Here the MAC address of one of the virtual interfaces should be picked as the new main MAC address of the device. However the main MAC address (stored in common->macaddr) is never updated. The ath9k does implement this properly and sets the main MAC address to the MAC address of one of the virtual interfaces (by first writing it to iter_data->hw_macaddr and then copying it over to common->macaddr [2]). Note that ath_hw_setbssidmask updates the main MAC address register for both the ath9k and ath9k_htc drivers [3]. Can a CVE please be assigned? Cheers, Mathy [1] <http://lxr.free-electrons.com/source/drivers/net/wireless/ath/ath9k/htc_drv _main.c?a=microblaze#L145> http://lxr.free-electrons.com/source/drivers/net/wireless/ath/ath9k/htc_drv_ main.c?a=microblaze#L145 [2] <http://lxr.free-electrons.com/source/drivers/net/wireless/ath/ath9k/main.c# L831> http://lxr.free-electrons.com/source/drivers/net/wireless/ath/ath9k/main.c#L 831 [3] <http://lxr.free-electrons.com/source/drivers/net/wireless/ath/hw.c#L118> http://lxr.free-electrons.com/source/drivers/net/wireless/ath/hw.c#L118 Disclaimer: http://www.kuleuven.be/cwis/email_disclaimer.htm
Current thread:
- CVE request: ath9k_htc improperly updates MAC address Mathy Vanhoef (Nov 14)
- Re: CVE request: ath9k_htc improperly updates MAC address Kurt Seifried (Nov 14)