Vulnerability Note VU#445753

NetGear wireless driver fails to properly process certain 802.11 management frames

Original Release date: 17 Nov 2006 | Last revised: 17 Nov 2006


A buffer overflow vulnerability has been reported in the Netgear WG111v2.SYS wireless driver. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code, or cause a denial-of-service condition.


The WG111v2.SYS driver is a wireless (802.11) device driver produced by Netgear.

A stack buffer overflow vulnerability has been reported in the WG111v2.SYS driver. An attacker may be able to trigger the overflow by sending a malformed beacon request frame to a vulnerable system. Since 802.11b and 802.11g management frames are not encrypted, using wireless encryption (WEP/WPA) does not mitigate this vulnerability.

Note that Linux or Unix systems that use NDISWrapper or similar technologies to load the WG111v2.SYS driver may also be vulnerable.


A remote, unauthenticated attacker may be able to execute arbitrary code, or cause a denial-of-service condition on a vulnerable system.


We are currently unaware of a practical solution to this problem.

Disable wireless adapters

Disabling wireless adapters may reduce the chances of this vulnerability being exploited.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Netgear, Inc.Affected-17 Nov 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This issue was publicly reported by H.D. Moore on The Month of Kernel Bugs Website.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: Unknown
  • Date Public: 16 Nov 2006
  • Date First Published: 17 Nov 2006
  • Date Last Updated: 17 Nov 2006
  • Severity Metric: 3.48
  • Document Revision: 21


If you have feedback, comments, or additional information about this vulnerability, please send us email.