[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <468b4846a8a3.46a8a3468b48@email.bigpond.com>
From: michaeltone1975 at telstra.com (michaeltone1975)
Subject: 802.11b (others) single packet DoS
http://www.auscert.org.au/render.html?it=4091
The vulnerability is related to the medium access control (MAC)
function of the IEEE 802.11 protocol. WLAN devices perform Carrier
Sense Multiple Access with Collision Avoidance (CSMA/CA), which
minimises the likelihood of two devices transmitting
simultaneously. Fundamental to the functioning of CSMA/CA is the
Clear Channel Assessment (CCA) procedure, used in all
standards-compliant hardware and performed by a Direct Sequence
Spread Spectrum (DSSS) physical (PHY) layer.
An attack against this vulnerability exploits the CCA function at
the physical layer and causes all WLAN nodes within range, both
clients and access points (AP), to defer transmission of data for
the duration of the attack. When under attack, the device behaves
as if the channel is always busy, preventing the transmission of
any data over the wireless network.
http://standards.ieee.org/getieee802/download/802.11-1999.pdf
Powered by blists - more mailing lists