Executive Summary
Summary | |
---|---|
Title | Atheros wireless network drivers may fail to properly handle malformed frames |
Informations | |||
---|---|---|---|
Name | VU#730169 | First vendor Publication | 2007-08-01 |
Vendor | VU-CERT | Last vendor Modification | 2007-08-14 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#730169Atheros wireless network drivers may fail to properly handle malformed framesOverviewAtheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition.I. DescriptionSome versions of the Microsoft Windows drivers for Atheros 802.11 a/b/g wireless adapters fail to properly handle malformed frames. If a remote attacker within transmitting range of an affected wireless adapter sends a specially crafted frame to that adapter, they may be able to trigger this vulnerability.This overflow occurs because the driver does not properly process management frames. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b, 802.11g, and 802.11n management frames are not encrypted or authenticated, using wireless encryption (WEP/WPA) does not mitigate this vulnerability. Atheros has released an update (firmware versions 5.3.0.35 and 6.0.3.67 and later) to original equipment manufacturers to address this issue. Users should see the systems affected portion of this document for a partial list of affected vendors.
References
Thanks to Nicholas Krasny of IBM Managed Security Services for information about this vulnerability and to Jeremy Kelley for reporting. This document was written by Ryan Giobbi.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/730169 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Hardware | 2 | |
Os | 1 |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
37992 | Atheros 802.11 Wireless Driver on Windows Management Frame Handling DoS |