search menu icon-carat-right cmu-wordmark

CERT Coordination Center

NetGear wireless driver fails to properly process certain 802.11 management frames

Vulnerability Note VU#445753

Original Release Date: 2006-11-17 | Last Revised: 2006-11-17

Overview

A buffer overflow vulnerability has been reported in the Netgear WG111v2.SYS wireless driver. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code, or cause a denial-of-service condition.

Description

The WG111v2.SYS driver is a wireless (802.11) device driver produced by Netgear.

A stack buffer overflow vulnerability has been reported in the WG111v2.SYS driver. An attacker may be able to trigger the overflow by sending a malformed beacon request frame to a vulnerable system. Since 802.11b and 802.11g management frames are not encrypted, using wireless encryption (WEP/WPA) does not mitigate this vulnerability.

Note that Linux or Unix systems that use NDISWrapper or similar technologies to load the WG111v2.SYS driver may also be vulnerable.

Impact

A remote, unauthenticated attacker may be able to execute arbitrary code, or cause a denial-of-service condition on a vulnerable system.

Solution

We are currently unaware of a practical solution to this problem.

Disable wireless adapters

Disabling wireless adapters may reduce the chances of this vulnerability being exploited.

Vendor Information

445753
 

Netgear, Inc. Affected

Updated:  November 17, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This issue was publicly reported by H.D. Moore on The Month of Kernel Bugs Website.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: None
Severity Metric: 3.48
Date Public: 2006-11-16
Date First Published: 2006-11-17
Date Last Updated: 2006-11-17 15:45 UTC
Document Revision: 23

Sponsored by CISA.