Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition.
Some versions of the Microsoft Windows drivers for Atheros 802.11 a/b/g wireless adapters fail to properly handle malformed frames. If a remote attacker within transmitting range of an affected wireless adapter sends a specially crafted frame to that adapter, they may be able to trigger this vulnerability.
This overflow occurs because the driver does not properly process management frames. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b, 802.11g, and 802.11n management frames are not encrypted or authenticated, using wireless encryption (WEP/WPA) does not mitigate this vulnerability.
An unauthenticated, remote attacker may be able to create a denial-of-service condition.
Thanks to Nicholas Krasny of IBM Managed Security Services for information about this vulnerability and to Jeremy Kelley for reporting.
This document was written by Ryan Giobbi.
|Date First Published:||2007-08-01|
|Date Last Updated:||2007-12-12 03:43 UTC|