Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:13831
HistoryAug 10, 2006 - 12:00 a.m.

Intel® Centrino Wireless Driver Malformed Frame Remote Code Execution

2006-08-1000:00:00
vulners.com
10

Intel® Centrino Wireless Driver Malformed Frame Remote Code Execution

Summary:
Security vulnerabilities exist in the Microsoft* Windows* drivers for the Intel® 2200BG and 2915ABG PRO/Wireless Network Connection Hardware because of the way that they currently handle certain frames. An attacker could potentially exploit these vulnerabilities which could potentially lead to remote code execution and system control.

Description:
Security vulnerabilities have been identified in the Microsoft* Windows* drivers for the Intel® 2200BG and 2915ABG PRO/Wireless Network Connection Hardware (w22n50.sys, w22n51.sys, w29n50.sys, w29n51.sys), which could potentially be exploited by attackers within range of the Wi-Fi station to execute arbitrary code on the target system with kernel-level privileges. These flaws are due to a memory corruption while parsing certain frames.

Affected products:
Product Application Versions Driver Versions Affected Versions
Intel® PRO/Wireless 2200BG Network Connection Intel® PROSet/Wireless 8, 9, 10 8.x.x.x, 9.x.x.x All prior to 10.5 with drvr 9.0.4.16
Intel® PRO/Wireless 2915ABG Network Connection Intel® PROSet/Wireless 9, 10 9.x.x.x All prior to 10.5 with drvr 9.0.4.16
If you have Intel® PRO/Wireless 2200BG and 2915ABG Network Connection Hardware installed and are using Microsoft Windows on your system(s), your system could be affected. If you are unsure of the product in your system, please go to the following URL to identify it: http://support.intel.com/support/wireless/wlan/sb/cs-005905.htm

Recommendations:
While Intel is not aware of any malicious use of the vulnerability described in this advisory, users should upgrade the Microsoft* Windows* drivers for the Intel® 2200BG and 2915ABG PRO/Wireless Network Connection Hardware. The Following URL contains the software download which resolves this vulnerability.
[http://support.intel.com/support/wireless/wlan/sb/cs-010623.htm]

Revision history:
Revision Date Description
1.0 7-28-2006 Initial public release.

Disclaimer:
INFORMATION IN THIS DOCUMENT IS PROVIDED 'AS IS' IN CONNECTION WITH INTEL® PRODUCTS. YOUR USE OF THE INFORMATION IN THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. INTEL RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.

EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT.

Copyright © 2006, Intel Corporation