[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200405131520.i4DFKntN013285@turing-police.cc.vt.edu>
From: Valdis.Kletnieks at vt.edu (Valdis.Kletnieks@...edu)
Subject: (AUSCERT AA-2004.02) AUSCERT Advisory - Denial of Service Vulnerability in IEEE 802.11 Wireless Devices (fwd)
On Thu, 13 May 2004 15:22:19 +1000, Sean Batt <sean@...mbs.anu.edu.au> said:
> ===========================================================================
> AA-2004.02 AUSCERT Advisory
>
> Denial of Service Vulnerability in IEEE 802.11 Wireless Devices
> 13 May 2004
....
> The vulnerability is related to the medium access control (MAC)
> function of the IEEE 802.11 protocol. WLAN devices perform Carrier
> Sense Multiple Access with Collision Avoidance (CSMA/CA), which
"Protocols that work by listening for silence to know when it's OK to
start sending will lock up if something transmits continuous non-silence".
Am I the only person around who's been in this business long enough to remember
how one jabbering transciever can take down an entire Ethernet thinwire or
thickwire segment??
This is right up there with the recent "Wow, RFC793 says an RST only has
to be in the window, not right on it" TCP "hole".
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 226 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20040513/1cdafcac/attachment.bin
Powered by blists - more mailing lists