Overview
Two buffer overflow vulnerabilities exist in Apple AirPort wireless drivers. If exploited, this vulnerability may allow an attacker to execute arbitrary code.
Description
According to Apple: Two separate stack buffer overflows exist in the AirPort wireless driver's handling of malformed frames. |
Impact
An unauthenticated attacker may be able to execute arbitrary code with kernel (ring 0) privileges. |
Solution
Apply updates from Apple |
Turn your AirPort Card off when you're in situations where radio communication may be prohibited, such as in an airplane or at a hospital. If you have disabled the AirPort port in Network preferences, then your AirPort Card is already turned off. To disable the AirPort port, choose Network Port Configurations from the Show pop-up menu and deselect the AirPort checkbox. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Apple for providing information on this vulnerability.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2006-3507 |
Severity Metric: | 20.48 |
Date Public: | 2006-09-21 |
Date First Published: | 2006-09-22 |
Date Last Updated: | 2006-11-01 17:16 UTC |
Document Revision: | 33 |