A buffer overflow in certain Apple AirPort drivers may allow an attacker to execute arbitrary code with system privileges, or create a denial-of-service condition.
A buffer overflow vulnerability has been reported in Orinoco-based Airport drivers. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b and 802.11g management frames are not encrypted, using wireless encryption (WEP/WPA) does not mitigate this vulnerability.
Per Apple, this vulnerability affects eMac, iBook, iMac, PowerBook G3, PowerBook G4, and Power Mac G4 systems using their original wireless adapter. Airport Extreme devices and drivers are not affected by this vulnerability.
A remote, unauthenticated attacker may be able to execute arbitrary code with system privileges.
Apple has released Security Update 2006-007 to address this issue.
Disable wireless adapters
Disabling wireless adapters may reduce the chances of this vulnerability being exploited.
Use wired networking methods until updates can be applied
Using wired networks, such as Ethernet adapters or other extended LAN technologies, until vulnerable wireless drivers can be updated will prevent this vulnerability from being exploited.
Vendor| Status| Date Notified| Date Updated
Apple Computer, Inc.| | 01 Nov 2006| 29 Nov 2006
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
Thanks to HD Moore for providing information about this vulnerability.
This document was written by Ryan Giobbi.