Vulnerabilities > CVE-2006-3992 - Unspecified vulnerability in Intel 2200Bg Proset Wireless and 2915Abg Proset Wireless
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN intel
nessus
Summary
Unspecified vulnerability in the Centrino (1) w22n50.sys, (2) w22n51.sys, (3) w29n50.sys, and (4) w29n51.sys Microsoft Windows drivers for Intel 2200BG and 2915ABG PRO/Wireless Network Connection before 10.5 with driver 9.0.4.16 allows remote attackers to execute arbitrary code via certain frames that trigger memory corruption.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Nessus
NASL family | Windows |
NASL id | IPW_CODE_EXECUTION.NASL |
description | The remote host is running a version of Intel Wireless/PRO 2200/2915 driver that is is affected by a memory corruption vulnerability. An attacker may exploit this flaw to execute arbitrary code on the remote host with kernel privileges or to disable the remote service remotely. To exploit this flaw, an attacker would need to send a specially crafted wireless frame to the remote host. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22131 |
published | 2006-08-02 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22131 |
title | Intel PRO/Wireless Network Connection Drivers Remote Code Execution Vulnerabilities |
code |
|
References
- http://securitytracker.com/id?1016621
- http://securitytracker.com/id?1016621
- http://support.intel.com/support/wireless/wlan/sb/CS-023065.htm
- http://support.intel.com/support/wireless/wlan/sb/CS-023065.htm
- http://www.kb.cert.org/vuls/id/230208
- http://www.kb.cert.org/vuls/id/230208
- http://www.securityfocus.com/bid/19298
- http://www.securityfocus.com/bid/19298
- http://www.vupen.com/english/advisories/2006/3100
- http://www.vupen.com/english/advisories/2006/3100