vendor:
BCM4329 Firmware
by:
CoreLabs (Core Security Technologies)
8,8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: BCM4329 Firmware
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: YES
Related CWE: 2012-2619
CPE: a:broadcom:bcm4329_firmware
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Apple iPhone 3GS, Apple iPod 2G, HTC Touch Pro 2, HTC Droid Incredible, Samsung Spica, Acer Liquid, Motorola Devour, Ford Edge, Apple iPhone 4, Apple iPhone 4 Verizon, Apple iPod 3G, Apple iPad Wi-Fi, Apple iPad 3G, Apple iPad 2, Apple Tv 2G, Motorola Xoom, Motorola Droid X2, Motorola Atrix, Samsung Galaxy Tab, Samsung Galaxy S 4G, Samsung Nexus S, Samsung Stratosphere, Samsung Fascinate, HTC Nexus One, HTC Evo 4G, HTC ThunderBolt, HTC Droid Incredible 2, LG Revolution, Sony Ericsson Xperia Play, Pantech Breakout, Nokia Lumina 800, Kyocera Echo, Asus Transformer Prime, Malata ZPad
2012
Exploit for BCM4329 Chipset
This exploit is a python script that generates a beacon frame with a sequence number of 4096. The frame control, frame body, information elements, and vendor specific elements are all included in the frame. The frame is then sent to the affected devices with the BCM4329 chipset.
Mitigation:
Update to the latest version of the chipset.