CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
95.4%
A buffer overflow vulnerability exists in the Netgear WG311ND5.SYS
wireless driver. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code, or cause a denial-of-service condition.
The WG311ND5.SYS
driver is a wireless (802.11g) device driver produced by Netgear that ships with the WG311v1 wireless adapter.
A heap buffer overflow vulnerability has been reported in the WG311ND5.SYS
driver. This overflow occurs because the driver does not properly process the SSID information element part of 802.11 management frames. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b and 802.11g management frames are not encrypted or authenticated, using wireless encryption (WEP/WPA) does not mitigate this vulnerability.
Note that Linux or Unix systems that use NDISWrapper or similar technologies to load the WG311ND5.SYS
driver may also be vulnerable.
An attacker may be able to execute arbitrary code, or cause a denial-of-service condition.
We are currently unaware of a practical solution to this problem.
Disable wireless adapters
Disabling wireless adapters may reduce the chances of this vulnerability being exploited.
403152
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: November 24, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This issue was reported by Laurent Butti, H D Moore and LMH on the Month of Kernel Bugs website.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-6125 |
---|---|
Severity Metric: | 0.50 Date Public: |