lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 15 May 2004 20:35:24 +0200 From: Casper Dik <casper@...land.sun.com> To: albatross@....it Cc: bugtraq@...urityfocus.com Subject: Re: Denial of Service Vulnerability in IEEE 802.11 Wireless Devices > An attack against this vulnerability exploits the CCA function at > the physical layer and causes all WLAN nodes within range, both > clients and access points (AP), to defer transmission of data for > the duration of the attack. When under attack, the device behaves > as if the channel is always busy, preventing the transmission of > any data over the wireless network. > > Previously, attacks against the availability of IEEE 802.11 > networks have required specialised hardware and relied on the > ability to saturate the wireless frequency with high-power > radiation, an avenue not open to discreet attack. This > vulnerability makes a successful, low cost attack against a > wireless network feasible for a semi-skilled attacker. > In last year's Usenix security symposium an attack which looked very much like one in the first paragraph was performed agains tthe audience (immediate linkloss was the result of the presenter pressing a button on his laptop). This was with with plain COTS components, so what is different with this attack or is it the same attack rediscovered? I don't remember it getting any press. Casper
Powered by blists - more mailing lists