{"vuid":"VU#730169","idnumber":"730169","name":"Atheros wireless network drivers may fail to properly handle malformed frames","keywords":["Atheros drivers","atheros","802.11a/b/g","frame","802.11","INFO#111001"],"overview":"Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition.","clean_desc":"Some versions of the Microsoft Windows drivers for Atheros 802.11 a/b/g wireless adapters fail to properly handle malformed frames. If a remote attacker within transmitting range of an affected wireless adapter sends a specially crafted frame to that adapter, they may be able to trigger this vulnerability. This overflow occurs because the driver does not properly process management frames. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b, 802.11g, and 802.11n management frames are not encrypted or authenticated, using wireless encryption (WEP/WPA) does not mitigate this vulnerability. Note that Linux or Unix systems that use NDISWrapper or similar technologies to load the affected driver may also be vulnerable.","impact":"An unauthenticated, remote attacker may be able to create a denial-of-service condition.","resolution":"Upgrade\nAtheros has released an update (firmware versions 5.3.0.35 and 6.0.3.67 and later) to original equipment manufacturers to address this issue. Users should see the systems affected portion of this document for a partial list of affected vendors.","workarounds":"Disable the affected wireless adapter Until updates can be applied, turning off the affected wireless adapter may mitigate this vulnerability.","sysaffected":"","thanks":"Thanks to Nicholas Krasny of IBM Managed Security Services for information about this vulnerability and to Jeremy Kelley for reporting.","author":"This document was written by Ryan Giobbi.","public":["http://www.atheros.com/contact/index.html","http://standards.ieee.org/announcements/pr_frames.html","http://standards.ieee.org/getieee802/download/802.11-1999.pdf","http://secunia.com/advisories/26348/"],"cveids":["CVE-2007-2927"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-02-12T19:03:07Z","publicdate":"2007-08-01T00:00:00Z","datefirstpublished":"2007-08-01T10:09:10Z","dateupdated":"2007-12-12T03:43:47Z","revision":27,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"4","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"3","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"0.765","cam_scorecurrentwidelyknown":"2.295","cam_scorecurrentwidelyknownexploited":"4.2075","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.765,"vulnote":null}