Overview
A buffer overflow in certain Apple AirPort drivers may allow an attacker to execute arbitrary code with system privileges, or create a denial-of-service condition.
Description
Apple Airport products are 802.11b and 802.11g compatible wireless devices that are produced by Apple. Airport Extreme wireless adapters are capable of joining 802.11g wireless networks. A buffer overflow vulnerability has been reported in Orinoco-based Airport drivers. An attacker within radio range may be able to trigger the overflow by sending a specially-crafted 802.11 management frame to a vulnerable system. Since 802.11b and 802.11g management frames are not encrypted, using wireless encryption (WEP/WPA) does not mitigate this vulnerability. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code with system privileges. |
Solution
Upgrade |
Disable wireless adapters |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
Thanks to HD Moore for providing information about this vulnerability.
This document was written by Ryan Giobbi.
Other Information
| CVE IDs: | CVE-2006-5710 |
| Severity Metric: | 0.34 |
| Date Public: | 2006-11-01 |
| Date First Published: | 2006-11-30 |
| Date Last Updated: | 2006-11-30 15:07 UTC |
| Document Revision: | 20 |