{"vuid":"VU#230208","idnumber":"230208","name":"Intel Centrino wireless network drivers fail to properly handle malformed frames","keywords":["Intel","centrino","network","wireless","driver","2200BG","2915ABG","w22n50.sys","w22n51.sys","w29n50.sys","w29n51.sys","pro","proset","802.11","cs-023065"],"overview":"Microsoft Windows drivers for Intel Centrino wireless adapters fail to properly handle malformed frames. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"The Microsoft Windows drivers for Intel Centrino 2200BG and 2915ABG PRO wireless adapters fail to properly handle malformed frames. If a remote attacker within transmitting range of an affected wireless adapter sends a specially crafted frame to that adapter, they may be able to trigger this vulnerability. Affected drivers include w22n50.sys, w22n51.sys, w29n50.sys, and w29n51.sys. For more information refer to INTEL-SA-00001.","impact":"An unauthenticated, remote attacker may be able to execute arbitrary code with kernel-level privileges.","resolution":"Upgrade Intel drivers\nIntel has released updates to address this issue. The Intel support site also provides a tool to assist users in determining the model and version of the wireless adapter they are using. Public reports indicate there may be compatibility issues when installing the new drivers. Known issues with the new drivers are documented in the driver release notes. Users should consult the release notes specific to their driver before applying updates. Users are encouraged to consult their OEM and hardware providers to determine the best way to update drivers. From Intel: It is recommended that you obtain and use the software provided via your laptop manufacturer. Intel® is a supplier of laptop components and does not manufacture or sell complete laptop systems. The software provided by Intel ... is a generic version. Each laptop computer original equipment manufacturer (OEM) may have altered the features, incorporated customizations, or made other changes to the software or software packaging they provide. The software provided has not been verified by your laptop manufacturer as to compatibility or other operation. See the systems affected section of this document for more details regarding updates from specific OEMs.","workarounds":"Disable the affected wireless adapter Until updates can be applied, turning off the affected wireless adapter may mitigate this vulnerability.","sysaffected":"","thanks":"This vulnerability was reported in Intel Security Bulletin \nCS-023065","author":"This document was written by Ryan Giobbi and Jeff Gennari.","public":["http://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00001&languageid=en-fr","http://support.intel.com/support/wireless/wlan/sb/cs-005905.htm","http://support.intel.com/support/wireless/wlan/sb/cs-010623.htm","http://downloadmirror.intel.com/df-support/11141/ENG/relnotes.htm","http://www.f-secure.com/weblog/archives/archive-082006.html#00000940","http://www.f-secure.com/weblog/archives/archive-082006.html#00000938","ftp://download.intel.com/support/wireless/wlan/sb/3945abgug.pdf","http://support.intel.com/support/wireless/wlan/pro2200bg/","ftp://download.intel.com/support/wireless/wlan/pro2200bg/2200BGUG.PDF","http://www.ciac.org/ciac/bulletins/q-268.shtml"],"cveids":["CVE-2006-3992"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-08-05T01:01:46Z","publicdate":"2006-07-28T00:00:00Z","datefirstpublished":"2006-08-07T16:26:55Z","dateupdated":"2007-05-31T13:55:41Z","revision":99,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"6","cam_population":"19","cam_impact":"20","cam_easeofexploitation":"5","cam_attackeraccessrequired":"17","cam_scorecurrent":"12.718125","cam_scorecurrentwidelyknown":"15.74625","cam_scorecurrentwidelyknownexploited":"27.85875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.718125,"vulnote":null}