ID

VAR-200611-0141


CVE

CVE-2006-5882


TITLE

Broadcom wireless driver fails to properly process 802.11 probe response frames

Trust: 0.8

sources: CERT/CC: VU#209376

DESCRIPTION

Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter before 4.100.15.5 and other products, allows remote attackers to execute arbitrary code via an 802.11 response frame containing a long SSID field. A buffer overflow vulnerability exists in the Broadcom BCMWL5.SYS wireless driver. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code, or cause a denial-of-service condition. ---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Broadcom Wireless Driver Probe Response SSID Buffer Overflow SECUNIA ADVISORY ID: SA22831 VERIFY ADVISORY: http://secunia.com/advisories/22831/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote SOFTWARE: Broadcom NIDS 5.0 Wireless Driver 3.x http://secunia.com/product/12559/ DESCRIPTION: Johnny Cache has reported a vulnerability in Broadcom Wireless driver, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in the BCMWL5.SYS device driver when handling probe response requests with a long SSID. This can be exploited to cause a stack-based buffer overflow via a specially crafted packet. The vulnerability is reported in version 3.50.21.10. Other versions may also be affected. SOLUTION: Update to the latest version. Linksys: http://www.linksys.com/servlet/Satellite?c=L_Download_C2&childpagename=US%2FLayout&cid=1115417109934&packedargs=sku%3D1144763513196&pagename=Linksys%2FCommon%2FVisitorWrapper Turn off the wireless card when not in use. PROVIDED AND/OR DISCOVERED BY: Johnny Cache ORIGINAL ADVISORY: http://projects.info-pull.com/mokb/MOKB-11-11-2006.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.52

sources: NVD: CVE-2006-5882 // CERT/CC: VU#209376 // JVNDB: JVNDB-2006-000779 // VULHUB: VHN-21990 // PACKETSTORM: 51946

AFFECTED PRODUCTS

vendor:broadcommodel:bcmwl5.sys wireless device driverscope:eqversion:3.50.21.10

Trust: 1.6

vendor:linksysmodel:wpc300n wireless-n notebook adapter driverscope:eqversion:*

Trust: 1.0

vendor:broadcommodel: - scope: - version: -

Trust: 0.8

vendor:dell computermodel: - scope: - version: -

Trust: 0.8

vendor:linksys a division of ciscomodel: - scope: - version: -

Trust: 0.8

vendor:broadcommodel:bcmwl5.sysscope:eqversion:wireless device driver 3.50.21.10

Trust: 0.8

vendor:fujitsumodel:fmv-bibloscope:eqversion:mg17d/a

Trust: 0.8

vendor:fujitsumodel:fmv-bibloscope:eqversion:nh28d

Trust: 0.8

vendor:fujitsumodel:fmv-bibloscope:eqversion:nh28dn

Trust: 0.8

vendor:fujitsumodel:fmv-looxscope:eqversion:t60d

Trust: 0.8

sources: CERT/CC: VU#209376 // JVNDB: JVNDB-2006-000779 // CNNVD: CNNVD-200611-197 // NVD: CVE-2006-5882

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-5882
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#209376
value: 1.63

Trust: 0.8

NVD: CVE-2006-5882
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200611-197
value: HIGH

Trust: 0.6

VULHUB: VHN-21990
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2006-5882
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2006-5882
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-21990
severity: HIGH
baseScore: 8.3
vectorString: AV:A/AC:L/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#209376 // VULHUB: VHN-21990 // JVNDB: JVNDB-2006-000779 // CNNVD: CNNVD-200611-197 // NVD: CVE-2006-5882

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-21990 // JVNDB: JVNDB-2006-000779 // NVD: CVE-2006-5882

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-200611-197

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200611-197

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000779

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-21990

PATCH

title:Top Pageurl:http://www.broadcom.com/

Trust: 0.8

title:Top Pageurl:http://ja.broadcom.com/

Trust: 0.8

title:Broadcom社製無線(ワイヤレス)LANドライバの脆弱性に関するお知らせ (個人のお客様向け)url:http://azby.fmworld.net/support/security/information/20061226.html

Trust: 0.8

title:Broadcom社製無線(ワイヤレス)LANドライバの脆弱性に関するお知らせ (法人のお客様向け)url:http://www.fmworld.net/biz/fmv/annc/broadcom/20061226.html

Trust: 0.8

title:VU#209376url:http://software.fujitsu.com/jp/security/vulnerabilities/vu209376.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-000779

EXTERNAL IDS

db:CERT/CCid:VU#209376

Trust: 3.3

db:SECUNIAid:22831

Trust: 2.6

db:SECTRACKid:1017212

Trust: 2.5

db:NVDid:CVE-2006-5882

Trust: 2.5

db:VUPENid:ADV-2006-4459

Trust: 1.7

db:VUPENid:ADV-2006-4460

Trust: 1.7

db:JVNDBid:JVNDB-2006-000779

Trust: 0.8

db:CNNVDid:CNNVD-200611-197

Trust: 0.7

db:XFid:30202

Trust: 0.6

db:XFid:5

Trust: 0.6

db:EXPLOIT-DBid:2770

Trust: 0.1

db:BIDid:83616

Trust: 0.1

db:SEEBUGid:SSVID-70904

Trust: 0.1

db:VULHUBid:VHN-21990

Trust: 0.1

db:PACKETSTORMid:51946

Trust: 0.1

sources: CERT/CC: VU#209376 // VULHUB: VHN-21990 // JVNDB: JVNDB-2006-000779 // PACKETSTORM: 51946 // CNNVD: CNNVD-200611-197 // NVD: CVE-2006-5882

REFERENCES

url:http://projects.info-pull.com/mokb/mokb-11-11-2006.html

Trust: 2.6

url:http://www.kb.cert.org/vuls/id/209376

Trust: 2.5

url:http://securitytracker.com/id?1017212

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/mapg-6vgnhw

Trust: 1.7

url:http://secunia.com/advisories/22831

Trust: 1.7

url:http://www.linksys.com/servlet/satellite?c=l_download_c2&childpagename=us%2flayout&cid=1115417109934&packedargs=sku%3d1144763513196&pagename=linksys%2fcommon%2fvisitorwrapper

Trust: 1.7

url:http://www.vupen.com/english/advisories/2006/4459

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/4460

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30202

Trust: 1.1

url:http://secunia.com/advisories/22831/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5882

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23209376/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-5882

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/4460

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/30202

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/4459

Trust: 0.6

url:http://www.linksys.com/servlet/satellite?c=l_download_c2&childpagename=us%2flayout&cid=1115417109934&packedargs=sku%3d1144763513196&pagename=linksys%2fcommon%2fvisitorwrapper

Trust: 0.1

url:http://secunia.com/product/12559/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://corporate.secunia.com/products/48/?r=l

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/15/?r=l

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#209376 // VULHUB: VHN-21990 // JVNDB: JVNDB-2006-000779 // PACKETSTORM: 51946 // CNNVD: CNNVD-200611-197 // NVD: CVE-2006-5882

CREDITS

Secunia

Trust: 0.1

sources: PACKETSTORM: 51946

SOURCES

db:CERT/CCid:VU#209376
db:VULHUBid:VHN-21990
db:JVNDBid:JVNDB-2006-000779
db:PACKETSTORMid:51946
db:CNNVDid:CNNVD-200611-197
db:NVDid:CVE-2006-5882

LAST UPDATE DATE

2024-08-14T12:49:54.711000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#209376date:2007-01-17T00:00:00
db:VULHUBid:VHN-21990date:2017-07-20T00:00:00
db:JVNDBid:JVNDB-2006-000779date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200611-197date:2007-09-18T00:00:00
db:NVDid:CVE-2006-5882date:2017-07-20T01:34:03.383

SOURCES RELEASE DATE

db:CERT/CCid:VU#209376date:2006-11-14T00:00:00
db:VULHUBid:VHN-21990date:2006-11-14T00:00:00
db:JVNDBid:JVNDB-2006-000779date:2007-04-01T00:00:00
db:PACKETSTORMid:51946date:2006-11-13T15:24:28
db:CNNVDid:CNNVD-200611-197date:2006-11-14T00:00:00
db:NVDid:CVE-2006-5882date:2006-11-14T19:07:00