7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.122 Low
EPSS
Percentile
95.3%
A buffer overflow in certain Apple AirPort drivers may allow an attacker to execute arbitrary code with system privileges, or create a denial-of-service condition.
Apple Airport products are 802.11b and 802.11g compatible wireless devices that are produced by Apple. Airport Extreme wireless adapters are capable of joining 802.11g wireless networks.
A buffer overflow vulnerability has been reported in Orinoco-based Airport drivers. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b and 802.11g management frames are not encrypted, using wireless encryption (WEP/WPA) does not mitigate this vulnerability.
Per Apple, this vulnerability affects eMac, iBook, iMac, PowerBook G3, PowerBook G4, and Power Mac G4 systems using their original wireless adapter. Airport Extreme devices and drivers are not affected by this vulnerability.
A remote, unauthenticated attacker may be able to execute arbitrary code with system privileges.
Upgrade
Apple has released Security Update 2006-007 to address this issue.
**Disable wireless adapters **
Disabling wireless adapters may reduce the chances of this vulnerability being exploited.
Use wired networking methods until updates can be applied
Using wired networks, such as Ethernet adapters or other extended LAN technologies, until vulnerable wireless drivers can be updated will prevent this vulnerability from being exploited.
191336
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: November 01, 2006 Updated: November 29, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://docs.info.apple.com/article.html?artnum=304829> for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23191336 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to HD Moore for providing information about this vulnerability.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-5710 |
---|---|
Severity Metric: | 0.34 Date Public: |