[NEWS] Atheros Vendor Specific Information Element Overflow

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.

- - - - - - - - -

Atheros Vendor Specific Information Element Overflow


The wireless drivers in some Wi-Fi access points (such as the
ATHEROS-based Linksys WRT350N) do not correctly parse the Atheros vendor
specific information element included in association requests. This
information element is used by wireless devices to advertise Atheros
specific capabilities.


Vulnerable Systems:
* Linksys WRT350N (firmware v2.00.17) with Atheros AR5416-AC1E chipset

The bug can be triggered by a malicious association request sent to the
wireless access point where one of the information elements must be an
Atheros information element with an inappropriate length (typically too
long). This can be achieved only after a successful 802.11 authentication
(in "Open" or "Shared" mode according to the configuration of the wireless
access point).

Attack Impact:
Denial-of-service (reboot or hang-up) and possibly remote arbitrary code

2007-10-22 - Vulnerability reported to Linksys
2007-10-23 - Full details sent to Linksys
2008-09-04 - Public disclosure

CVE Information:


The information has been provided by
<mailto:laurent.butti@xxxxxxxxxxxxxxxxxx> Laurent Butti and Julien Tinnes.


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.