{"vuid":"VU#160027","idnumber":"160027","name":"Broadcom BCM4325 and BCM4329 wireless chipset denial-of-service vulnerability","keywords":["Broadcom","BCM4325","BCM4329","denial-of-service"],"overview":"Broadcom BCM4325 and BCM4329 wireless chipsets have been reported to contain an out-of-bounds read error condition that may be exploited to produce a denial-of-service condition.","clean_desc":"The CORE Security Technologies advisory states: \"An out-of-bounds read error condition exists in broadcom's BCM4325 and BCM4329 combo solutions firmware. This error can be leveraged to denial of service attack, and possibly information disclosure. An attacker can send a RSN (802.11i) information element, that causes the WiFi NIC to stop responding.\" Broadcom's official response is: \"CORE Security Technologies has identified a Denial-of-Service (DoS) vulnerability in the firmware running on two prior generation Broadcom chips, the BCM4325 and BCM4329. Other Broadcom chips are not affected. This denial of service attack can cause an unpatched consumer electronics device to experience a WLAN service interruption. The vulnerability does not enable exposure of the consumer's data. Broadcom has firmware patches for its OEM customers to address the issue. The vast majority of Broadcom's WLAN product portfolio is not subject to the DoS issue, including as examples: Broadcom's subsequent generations  of Mobility WLAN devices, e.g., BCM4330, BCM4334, BCM43241, BCM43340, BCM4335; Broadcom's products for the PC and Media market, e.g., BCM4313, BCM43142, BCM43224, BCM43228, BCM4331, BCM43236, BCM4352, BCM43526, BCM4360; Broadcom's Access Point WLAN devices and products, e.g., BCM4718, BCM535x, BCM4706; Broadcom has been working with multiple customers providing information and fixes as required, and will continue to address security issues that may be identified.\" Additional details can be found in the CORE Security Technologies advisory.","impact":"A remote attacker may be able to cause a denial-of-service condition against the WiFi network interface card.","resolution":"Apply an Update Users of devices with Broadcom BCM4325 or BCM4329 wireless chipsets should contact their vendor to acquire a patch.","workarounds":"","sysaffected":"","thanks":"Thanks to Andres Blanco and Matias Eissler for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["h","t","t","p",":","/","/","w","w","w",".","c","o","r","e","s","e","c","u","r","i","t","y",".","c","o","m","/","c","o","n","t","e","n","t","/","b","r","o","a","d","c","o","m","-","i","n","p","u","t","-","v","a","l","i","d","a","t","i","o","n","-","B","C","M","4","3","2","5","-","B","C","M","4","3","2","9"],"cveids":["CVE-2012-2619"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-08-14T15:19:34Z","publicdate":"2012-10-23T00:00:00Z","datefirstpublished":"2012-10-23T20:55:02Z","dateupdated":"2013-01-28T21:00:55Z","revision":32,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"A","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"N","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.1","cvss_basevector":"AV:A/AC:L/Au:N/C:N/I:N/A:C","cvss_temporalscore":"4.8","cvss_environmentalscore":"4.8","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}