Vulnerability Note VU#583552
Apple Airport Extreme fails to properly process 802.11 frames
A vulnerability exists in the Apple AirPort Extreme wireless driver that may allow an attacker to crash a vulnerable system.
The Apple AirPort Extreme adapter is an 802.11g compatible wireless adapter used in Apple OS X laptops and desktops.
A flaw exists in the way AirPort Extreme wireless drivers handle certain malformed 802.11 frames which may result in an out-of-bounds memory access. This flaw results in a vulnerability that could allow an attacker to cause a kernel panic on a vulnerable system.
A remote unauthenticated attacker within 802.11 radio range may be able to create a denial-of-service condition by crashing a vulnerable system.
Turn your AirPort Card off when you're in situations where radio communication may be prohibited, such as in an airplane or at a hospital.
If you have disabled the AirPort port in Network preferences, then your AirPort Card is already turned off. To disable the AirPort port, choose Network Port Configurations from the Show pop-up menu and deselect the AirPort checkbox.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer, Inc.||Affected||-||29 Jan 2007|
CVSS Metrics (Learn More)
This issue was made public by LMH on the Month of Kernel Bugs website.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2006-6292
- Date Public: 30 Nov 2006
- Date First Published: 02 Feb 2007
- Date Last Updated: 02 Feb 2007
- Severity Metric: 0.37
- Document Revision: 13
If you have feedback, comments, or additional information about this vulnerability, please send us email.