vendor:
WG311v1 Wireless PCI Adapter
by:
Laurent Butti
7.8
CVSS
HIGH
Heap-based buffer-overflow
119
CWE
Product Name: WG311v1 Wireless PCI Adapter
Affected Version From: 2.3.1.10
Affected Version To: 2.3.1.10
Patch Exists: YES
Related CWE: CVE-2006-6184
CPE: o:netgear:wg311_v1_wireless_pci_adapter
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, BSD
2006
NetGear WG311v1 Wireless Driver Long SSID Overflow
NetGear WG311v1 Wireless devices are prone to a heap-based buffer-overflow vulnerability because the driver fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Exploiting this issue allows attackers to execute arbitrary machine code in the context of the kernel hosting the vulnerable driver. Failed attempts will likely crash the kernel, resulting in denial-of-service conditions.
Mitigation:
Users should upgrade to the latest version of the driver.