{"vuid":"VU#824500","idnumber":"824500","name":"Drivers for the Intel 2100 PRO/Wireless Network Connection Hardware contain a memory corruption vulnerability","keywords":["Intel","Centrino","Wireless Driver","privilege escalation","CS-023067"],"overview":"Microsoft Windows drivers for Intel 2100 PRO/Wireless Network Connection Hardware contain a memory corruption vulnerability. This vulnerability may allow an attacker to execute arbitrary code on a vulnerable system.","clean_desc":"Intel 2100 PRO/Wireless Network Connection Hardware\nThe Intel 2100 Pro mini-PCI WiFi adapter is an 802.11b WLAN card. The Problem\nFrom INTEL-SA-00005: A security vulnerability exists in the Microsoft Windows  drivers for the Intel 2100 PRO/Wireless Network Connection Hardware because of the way that driver handles certain requests by applications. The vulnerability could potentially be exploited by injecting specially crafted malicious frames into the driver and with the aid of an application loaded on the local system kernel level privileges could potentially be obtained.","impact":"An attacker may be able to execute arbitrary code with kernel-level privileges.","resolution":"Upgrade Intel drivers\nIntel has released updates to address this issue. The Intel support site also provides a tool to assist users in determining the model and version of the wireless adapter they are using. Users are encouraged to consult their OEM and hardware providers to determine the best way to update drivers. From Intel: It is recommended that you obtain and use the software provided via your laptop manufacturer. Intel is a supplier of laptop components and does not manufacture or sell complete laptop systems. The software provided by Intel below is a generic version. Each laptop computer original equipment manufacturer (OEM) may have altered the features, incorporated customizations, or made other changes to the software or software packaging they provide. The software provided has not been verified by your laptop manufacturer as to compatibility or other operation. See the systems affected section of this document for more details regarding updates from specific OEMs.","workarounds":"Disable the affected wireless adapter Until updates can be applied, turning off the affected wireless adapter may mitigate this vulnerability.","sysaffected":"","thanks":"","author":"This document was written by Ryan Giobbi.","public":["h","t","t","p",":","/","/","s","e","c","u","r","i","t","y","-","c","e","n","t","e","r",".","i","n","t","e","l",".","c","o","m","/","a","d","v","i","s","o","r","y",".","a","s","p","x","?","i","n","t","e","l","i","d","=","I","N","T","E","L","-","S","A","-","0","0","0","0","5","&","l","a","n","g","u","a","g","e","i","d","=","e","n","-","f","r"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-08-16T16:52:24Z","publicdate":"2006-08-15T00:00:00Z","datefirstpublished":"2006-08-18T14:31:22Z","dateupdated":"2007-06-01T14:16:47Z","revision":32,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"9","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"10","cam_easeofexploitation":"6","cam_attackeraccessrequired":"2","cam_scorecurrent":"0.4275","cam_scorecurrentwidelyknown":"0.675","cam_scorecurrentwidelyknownexploited":"1.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.4275,"vulnote":null}