Vulnerability CVE-2006-5882


Published: 2006-11-14   Modified: 2012-02-12

Description:
Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter before 4.100.15.5 and other products, allows remote attackers to execute arbitrary code via an 802.11 response frame containing a long SSID field.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:A/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
8.3/10
10/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Linksys -> Wpc300n wireless-n notebook adapter driver 
Broadcom -> Bcmwl5.sys wireless device driver 

 References:
http://www.kb.cert.org/vuls/id/209376
http://www.kb.cert.org/vuls/id/MAPG-6VGNHW
http://xforce.iss.net/xforce/xfdb/30202
http://www.vupen.com/english/advisories/2006/4460
http://www.vupen.com/english/advisories/2006/4459
http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109934&packedargs=sku%3D1144763513196&pagename=Linksys%2FCommon%2FVisitorWrapper
http://securitytracker.com/id?1017212
http://secunia.com/advisories/22831
http://projects.info-pull.com/mokb/MOKB-11-11-2006.html

Copyright 2022, cxsecurity.com

 

Back to Top