Executive Summary

Summary
Title Atheros wireless network drivers may fail to properly handle malformed frames
Informations
Name VU#730169 First vendor Publication 2007-08-01
Vendor VU-CERT Last vendor Modification 2007-08-14
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#730169

Atheros wireless network drivers may fail to properly handle malformed frames

Overview

Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition.

I. Description

Some versions of the Microsoft Windows drivers for Atheros 802.11 a/b/g wireless adapters fail to properly handle malformed frames. If a remote attacker within transmitting range of an affected wireless adapter sends a specially crafted frame to that adapter, they may be able to trigger this vulnerability.

This overflow occurs because the driver does not properly process management frames. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b, 802.11g, and 802.11n management frames are not encrypted or authenticated, using wireless encryption (WEP/WPA) does not mitigate this vulnerability.

Note that Linux or Unix systems that use NDISWrapper or similar technologies to load the affected driver may also be vulnerable.

II. Impact

An unauthenticated, remote attacker may be able to create a denial-of-service condition.

III. Solution

Upgrade

Atheros has released an update (firmware versions 5.3.0.35 and 6.0.3.67 and later) to original equipment manufacturers to address this issue. Users should see the systems affected portion of this document for a partial list of affected vendors.

Disable the affected wireless adapter

Until updates can be applied, turning off the affected wireless adapter may mitigate this vulnerability.

Systems Affected

VendorStatusDate Updated
3com, Inc.Unknown16-May-2007
AlcatelUnknown16-May-2007
Apple Computer, Inc.Unknown16-May-2007
Atheros Communications, Inc.Vulnerable11-May-2007
AT&TUnknown16-May-2007
Avaya, Inc.Unknown16-May-2007
Avici Systems, Inc.Unknown16-May-2007
Borderware TechnologiesUnknown16-May-2007
Charlotte's Web NetworksUnknown16-May-2007
Check Point Software TechnologiesUnknown16-May-2007
Chiaro Networks, Inc.Unknown16-May-2007
Cisco Systems, Inc.Unknown11-May-2007
ClavisterUnknown16-May-2007
Computer AssociatesUnknown16-May-2007
Conectiva Inc.Unknown16-May-2007
Cray Inc.Unknown16-May-2007
D-Link Systems, Inc.Unknown11-May-2007
Data Connection, Ltd.Unknown16-May-2007
Debian GNU/LinuxUnknown16-May-2007
Dell Computer Corporation, Inc.Unknown5-Mar-2007
EMC, Inc. (formerly Data General Corporation)Unknown16-May-2007
Engarde Secure LinuxUnknown16-May-2007
EricssonUnknown16-May-2007
eSoft, Inc.Unknown16-May-2007
Extreme NetworksUnknown16-May-2007
F5 Networks, Inc.Unknown16-May-2007
Fedora ProjectUnknown16-May-2007
Force10 Networks, Inc.Unknown16-May-2007
Fortinet, Inc.Unknown16-May-2007
Foundry Networks, Inc.Unknown16-May-2007
FreeBSD, Inc.Unknown16-May-2007
FujitsuUnknown16-May-2007
Gentoo LinuxUnknown16-May-2007
Global Technology AssociatesUnknown16-May-2007
Hewlett-Packard CompanyUnknown5-Mar-2007
HitachiUnknown16-May-2007
HyperchipUnknown16-May-2007
IBM CorporationUnknown5-Mar-2007
IBM Corporation (zseries)Unknown16-May-2007
IBM eServerUnknown16-May-2007
Immunix Communications, Inc.Unknown16-May-2007
Ingrian Networks, Inc.Unknown16-May-2007
Intel CorporationUnknown16-May-2007
Internet Security Systems, Inc.Unknown16-May-2007
IntotoUnknown16-May-2007
IP FilterUnknown16-May-2007
Juniper Networks, Inc.Unknown16-May-2007
Linksys (A division of Cisco Systems)Unknown16-May-2007
Lucent TechnologiesUnknown16-May-2007
Luminous NetworksUnknown16-May-2007
Mandriva, Inc.Unknown16-May-2007
Microsoft CorporationUnknown16-May-2007
MontaVista Software, Inc.Unknown16-May-2007
Multinet (owned Process Software Corporation)Unknown16-May-2007
Multitech, Inc.Unknown16-May-2007
NEC CorporationUnknown5-Mar-2007
NetBSDUnknown16-May-2007
netfilterUnknown16-May-2007
Network Appliance, Inc.Unknown16-May-2007
NextHop Technologies, Inc.Unknown16-May-2007
NokiaUnknown16-May-2007
Nortel Networks, Inc.Unknown16-May-2007
Novell, Inc.Unknown16-May-2007
OpenBSDUnknown16-May-2007
Openwall GNU/*/LinuxUnknown16-May-2007
Philips ElectronicsUnknown16-May-2007
QNX, Software Systems, Inc.Unknown16-May-2007
Red Hat, Inc.Unknown16-May-2007
Redback Networks, Inc.Unknown16-May-2007
Riverstone Networks, Inc.Unknown16-May-2007
Secure Computing Network Security DivisionNot Vulnerable24-May-2007
Secureworx, Inc.Unknown16-May-2007
Silicon Graphics, Inc.Unknown16-May-2007
Slackware Linux Inc.Unknown16-May-2007
Sony CorporationUnknown5-Mar-2007
StonesoftUnknown16-May-2007
Sun Microsystems, Inc.Not Vulnerable20-May-2007
SUSE LinuxUnknown16-May-2007
Symantec, Inc.Unknown16-May-2007
The SCO GroupUnknown16-May-2007
ToshibaUnknown5-Mar-2007
TRENDnetUnknown16-May-2007
Trustix Secure LinuxUnknown16-May-2007
TurbolinuxUnknown16-May-2007
UbuntuUnknown16-May-2007
UnisysUnknown16-May-2007
Watchguard Technologies, Inc.Unknown16-May-2007
Wind River Systems, Inc.Unknown16-May-2007
ZyXELUnknown16-May-2007

References


http://www.atheros.com/contact/index.html
http://standards.ieee.org/announcements/pr_frames.html
http://standards.ieee.org/getieee802/download/802.11-1999.pdf
http://secunia.com/advisories/26348/

Credit

Thanks to Nicholas Krasny of IBM Managed Security Services for information about this vulnerability and to Jeremy Kelley for reporting.

This document was written by Ryan Giobbi.

Other Information

Date Public08/01/2007
Date First Published08/01/2007 06:09:09 AM
Date Last Updated08/14/2007
CERT Advisory 
CVE NameCVE-2007-2927
Metric0.77
Document Revision25

Original Source

Url : http://www.kb.cert.org/vuls/id/730169

CPE : Common Platform Enumeration

TypeDescriptionCount
Hardware 2
Os 1

Open Source Vulnerability Database (OSVDB)

Id Description
37992 Atheros 802.11 Wireless Driver on Windows Management Frame Handling DoS