Korean
<< Back
VID 28189
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Windows host has a Broadcom BCMWL5.SYS wireless driver that is vulnerable to a buffer overflow vulnerability. The BCMWL5.SYS driver is vulnerable to a stack-based buffer overflow vulnerability, caused by improper handling of 802.11 probe responses. By sending a malformed 802.11 probe response frame containing a long SSID field to a vulnerable host, a remote, unauthenticated attacker could execute arbitrary code, or cause a denial-of-service condition on the affected host.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://projects.info-pull.com/mokb/MOKB-11-11-2006.html
http://isotf.org/advisories/zert-01-111106.htm
http://isc.incidents.org/diary.php?storyid=1845
http://www.securiteam.com/mokb/projects.info-pull.com/mokb/MOKB-11-11-2006.html
http://www.kb.cert.org/vuls/id/209376
http://securitytracker.com/id?1017212
http://www.frsirt.com/english/advisories/2006/4459
http://www.frsirt.com/english/advisories/2006/4460
http://secunia.com/advisories/22831

* Platforms Affected:
Broadcom Wireless Driver versions 3.50.21.10 and earlier
Linksys WPC300N versions prior to 4.100.15.5
Microsoft Windows Any version
Recommendation For Linksys:
Upgrade to the latest driver version (4.100.15.5 or later), available from the Linksys WPC300N Web site at http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109934&packedargs=sku%3D1144763513196&pagename=Linksys%2FCommon%2FVisitorWrapper

For Zonet:
Upgrade to the latest driver version, available from the Zonet Web site at http://www.zonetusa.com/DispProductDownload.asp?ProductID=179
Related URL CVE-2006-5882 (CVE)
Related URL (SecurityFocus)
Related URL 30202 (ISS)