ID

VAR-200708-0003


CVE

CVE-2007-2927


TITLE

Atheros wireless network drivers may fail to properly handle malformed frames

Trust: 0.8

sources: CERT/CC: VU#730169

DESCRIPTION

Unspecified vulnerability in Atheros 802.11 a/b/g wireless adapter drivers before 5.3.0.35, and 6.x before 6.0.3.67, on Windows allows remote attackers to cause a denial of service via a crafted 802.11 management frame. Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition. Atheros Provided by the company Microsoft Windows The wireless network driver for is vulnerable to the frame handling part. Crafted 802.11 Sending a management frame causes a buffer overflow, resulting in service disruption ( DoS ) You may be attacked. 802.11b, 802.11g, 802.11n Management frames in are not encrypted and do not require authentication to be sent. further, WEP And WPA It has been found that even if wireless communication encryption such as is affected by this vulnerability. Linux And UNIX Used in NDISWrapper And using vulnerable drivers with similar technologies may also be affected.  The driver did not adequately check for malformed management frames, and a remote attacker could trigger an overflow by sending a specially constructed 802.11 management frame that requires no authentication or encryption. Atheros drivers are also used by OEM (Original Equipment Manufacturer) wireless adapters. This issue is reported to affect drivers for the Windows operating system. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. SOLUTION: The vendor has reportedly issued firmware updates (versions 5.3.0.35 and 6.0.3.67 and later) to OEMs. PROVIDED AND/OR DISCOVERED BY: Reported via US-CERT. ORIGINAL ADVISORY: US-CERT VU#730169: http://www.kb.cert.org/vuls/id/730169 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.33

sources: NVD: CVE-2007-2927 // CERT/CC: VU#730169 // JVNDB: JVNDB-2007-000565 // CNVD: CNVD-2007-4814 // BID: 25160 // VULHUB: VHN-26289 // PACKETSTORM: 58395

AFFECTED PRODUCTS

vendor:microsoftmodel:all windowsscope:eqversion:*

Trust: 1.0

vendor:atherosmodel: - scope: - version: -

Trust: 0.8

vendor:atherosmodel:driverscope:eqversion:version 5.3.0 system (atheros 802.11 a/b/g)

Trust: 0.8

vendor:atherosmodel:driverscope:eqversion:version 6.0.3 system (atheros 802.11 a/b/g)

Trust: 0.8

vendor:fujitsumodel:celsius work stationscope: - version: -

Trust: 0.8

vendor:fujitsumodel:fmv desktopscope: - version: -

Trust: 0.8

vendor:fujitsumodel:fmv thin clientscope: - version: -

Trust: 0.8

vendor:fujitsumodel:fmv-bibloscope: - version: -

Trust: 0.8

vendor:fujitsumodel:fmv-biblo looxscope: - version: -

Trust: 0.8

vendor:fujitsumodel:fmv-deskpowerscope: - version: -

Trust: 0.8

vendor:fujitsumodel:fmv-esprimoscope: - version: -

Trust: 0.8

vendor:fujitsumodel:fmv-lifebookscope: - version: -

Trust: 0.8

vendor:fujitsumodel:fmv-stylisticscope: - version: -

Trust: 0.8

vendor:nonemodel: - scope: - version: -

Trust: 0.6

vendor:atherosmodel:wireless adapter driversscope:eqversion:6.0.3.67

Trust: 0.6

vendor:atherosmodel:wireless adapter driversscope:eqversion:5.1.1.9

Trust: 0.6

vendor:atherosmodel:communications wireless driver a/b/gscope:eqversion:802.110

Trust: 0.3

sources: CERT/CC: VU#730169 // CNVD: CNVD-2007-4814 // BID: 25160 // JVNDB: JVNDB-2007-000565 // CNNVD: CNNVD-200708-075 // NVD: CVE-2007-2927

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2927
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#730169
value: 0.77

Trust: 0.8

NVD: CVE-2007-2927
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200708-075
value: MEDIUM

Trust: 0.6

VULHUB: VHN-26289
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-2927
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-26289
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#730169 // VULHUB: VHN-26289 // JVNDB: JVNDB-2007-000565 // CNNVD: CNNVD-200708-075 // NVD: CVE-2007-2927

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2927

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200708-075

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200708-075

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000565

PATCH

title:Top Pageurl:http://www.atheros.com/

Trust: 0.8

title:Atheros社製無線(ワイヤレス)LANドライバの脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/atheros/wlan/

Trust: 0.8

title:VU#730169url:http://software.fujitsu.com/jp/security/vulnerabilities/vu730169.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-000565

EXTERNAL IDS

db:CERT/CCid:VU#730169

Trust: 3.7

db:NVDid:CVE-2007-2927

Trust: 3.4

db:SECUNIAid:26348

Trust: 2.7

db:BIDid:25160

Trust: 2.0

db:VUPENid:ADV-2007-2756

Trust: 1.7

db:OSVDBid:37992

Trust: 1.7

db:JVNDBid:JVNDB-2007-000565

Trust: 0.8

db:CNVDid:CNVD-2007-4814

Trust: 0.6

db:XFid:35788

Trust: 0.6

db:CNNVDid:CNNVD-200708-075

Trust: 0.6

db:VULHUBid:VHN-26289

Trust: 0.1

db:PACKETSTORMid:58395

Trust: 0.1

sources: CERT/CC: VU#730169 // CNVD: CNVD-2007-4814 // VULHUB: VHN-26289 // BID: 25160 // JVNDB: JVNDB-2007-000565 // PACKETSTORM: 58395 // CNNVD: CNNVD-200708-075 // NVD: CVE-2007-2927

REFERENCES

url:http://www.kb.cert.org/vuls/id/730169

Trust: 2.9

url:http://www.securityfocus.com/bid/25160

Trust: 1.7

url:http://osvdb.org/37992

Trust: 1.7

url:http://secunia.com/advisories/26348

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2756

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35788

Trust: 1.1

url:http://secunia.com/advisories/26348/

Trust: 0.9

url:http://www.atheros.com/contact/index.html

Trust: 0.8

url:http://standards.ieee.org/announcements/pr_frames.html

Trust: 0.8

url:http://standards.ieee.org/getieee802/download/802.11-1999.pdf

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2927

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23730169/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2927

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/2756

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/35788

Trust: 0.6

url:http://www.atheros.com

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/15189/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#730169 // VULHUB: VHN-26289 // BID: 25160 // JVNDB: JVNDB-2007-000565 // PACKETSTORM: 58395 // CNNVD: CNNVD-200708-075 // NVD: CVE-2007-2927

CREDITS

Nicholas Krasny

Trust: 0.6

sources: CNNVD: CNNVD-200708-075

SOURCES

db:CERT/CCid:VU#730169
db:CNVDid:CNVD-2007-4814
db:VULHUBid:VHN-26289
db:BIDid:25160
db:JVNDBid:JVNDB-2007-000565
db:PACKETSTORMid:58395
db:CNNVDid:CNNVD-200708-075
db:NVDid:CVE-2007-2927

LAST UPDATE DATE

2024-11-23T22:46:48.252000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#730169date:2007-12-12T00:00:00
db:CNVDid:CNVD-2007-4814date:2007-08-01T00:00:00
db:VULHUBid:VHN-26289date:2017-07-29T00:00:00
db:BIDid:25160date:2007-08-02T20:55:00
db:JVNDBid:JVNDB-2007-000565date:2007-11-29T00:00:00
db:CNNVDid:CNNVD-200708-075date:2007-08-16T00:00:00
db:NVDid:CVE-2007-2927date:2024-11-21T00:31:59.260

SOURCES RELEASE DATE

db:CERT/CCid:VU#730169date:2007-08-01T00:00:00
db:CNVDid:CNVD-2007-4814date:2007-08-01T00:00:00
db:VULHUBid:VHN-26289date:2007-08-08T00:00:00
db:BIDid:25160date:2007-08-01T00:00:00
db:JVNDBid:JVNDB-2007-000565date:2007-08-09T00:00:00
db:PACKETSTORMid:58395date:2007-08-10T02:01:07
db:CNNVDid:CNNVD-200708-075date:2007-08-07T00:00:00
db:NVDid:CVE-2007-2927date:2007-08-08T01:17:00