Apple Airport driver fails to properly handle probe response frames

ID VU:191336
Type cert
Reporter CERT
Modified 2006-11-30T00:00:00



A buffer overflow in certain Apple AirPort drivers may allow an attacker to execute arbitrary code with system privileges, or create a denial-of-service condition.


Apple Airport products are 802.11b and 802.11g compatible wireless devices that are produced by Apple. Airport Extreme wireless adapters are capable of joining 802.11g wireless networks.

A buffer overflow vulnerability has been reported in Orinoco-based Airport drivers. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b and 802.11g management frames are not encrypted, using wireless encryption (WEP/WPA) does not mitigate this vulnerability.

Per Apple, this vulnerability affects eMac, iBook, iMac, PowerBook G3, PowerBook G4, and Power Mac G4 systems using their original wireless adapter. Airport Extreme devices and drivers are not affected by this vulnerability.


A remote, unauthenticated attacker may be able to execute arbitrary code with system privileges.


Apple has released Security Update 2006-007 to address this issue.

Disable wireless adapters

Disabling wireless adapters may reduce the chances of this vulnerability being exploited.

Use wired networking methods until updates can be applied

Using wired networks, such as Ethernet adapters or other extended LAN technologies, until vulnerable wireless drivers can be updated will prevent this vulnerability from being exploited.

Systems Affected

Vendor| Status| Date Notified| Date Updated
Apple Computer, Inc.| | 01 Nov 2006| 29 Nov 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>
  • <>
  • <>
  • <>
  • <>


Thanks to HD Moore for providing information about this vulnerability.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2006-5710
  • Date Public: 01 Nov 2006
  • Date First Published: 30 Nov 2006
  • Date Last Updated: 30 Nov 2006
  • Severity Metric: 0.34
  • Document Revision: 18