search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Drivers for the Intel 2100 PRO/Wireless Network Connection Hardware contain a memory corruption vulnerability

Vulnerability Note VU#824500

Original Release Date: 2006-08-18 | Last Revised: 2007-06-01

Overview

Microsoft Windows drivers for Intel 2100 PRO/Wireless Network Connection Hardware contain a memory corruption vulnerability. This vulnerability may allow an attacker to execute arbitrary code on a vulnerable system.

Description

Intel 2100 PRO/Wireless Network Connection Hardware

The Intel 2100 Pro mini-PCI WiFi adapter is an 802.11b WLAN card.

The Problem
From INTEL-SA-00005:
A security vulnerability exists in the Microsoft Windows drivers for the Intel 2100 PRO/Wireless Network Connection Hardware because of the way that driver handles certain requests by applications. The vulnerability could potentially be exploited by injecting specially crafted malicious frames into the driver and with the aid of an application loaded on the local system kernel level privileges could potentially be obtained.

Impact

An attacker may be able to execute arbitrary code with kernel-level privileges.

Solution

Upgrade Intel drivers

Intel has released updates to address this issue. The Intel support site also provides a tool to assist users in determining the model and version of the wireless adapter they are using.

Users are encouraged to consult their OEM and hardware providers to determine the best way to update drivers. From Intel:
It is recommended that you obtain and use the software provided via your laptop manufacturer.

Intel is a supplier of laptop components and does not manufacture or sell complete laptop systems. The software provided by Intel below is a generic version. Each laptop computer original equipment manufacturer (OEM) may have altered the features, incorporated customizations, or made other changes to the software or software packaging they provide. The software provided has not been verified by your laptop manufacturer as to compatibility or other operation.

See the systems affected section of this document for more details regarding updates from specific OEMs.

Disable the affected wireless adapter

Until updates can be applied, turning off the affected wireless adapter may mitigate this vulnerability.

Vendor Information

824500
 

Intel Corporation Affected

Updated:  August 18, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to the Intel support site for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Dell Computer Corporation, Inc. Unknown

Notified:  August 18, 2006 Updated: August 18, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Hewlett-Packard Company Unknown

Notified:  August 18, 2006 Updated: August 18, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

IBM Corporation Unknown

Notified:  August 18, 2006 Updated: August 18, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Microsoft Corporation Unknown

Notified:  August 18, 2006 Updated: August 18, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

NEC Corporation Unknown

Notified:  August 18, 2006 Updated: August 18, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Sony Corporation Unknown

Notified:  August 18, 2006 Updated: August 18, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Toshiba Unknown

Notified:  August 18, 2006 Updated: August 18, 2006

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Ryan Giobbi.

Other Information

CVE IDs: None
Severity Metric: 0.43
Date Public: 2006-08-15
Date First Published: 2006-08-18
Date Last Updated: 2007-06-01 14:16 UTC
Document Revision: 32

Sponsored by CISA.