Vulnerabilities > CVE-2006-4022 - Unspecified vulnerability in Intel 2100 Proset Wireless 7.1.4.5
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN intel
nessus
Summary
Intel 2100 PRO/Wireless Network Connection driver PROSet before 7.1.4.6 allows local users to corrupt memory and execute code via "requests for capabilities from higher-level protocol drivers or user-level applications" involving crafted frames, a different issue than CVE-2006-3992.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Windows |
NASL id | IPW_PRIVILEGE_ESCALATION.NASL |
description | The remote host is running a version of Intel Wireless/PRO 2100 driver that is fails to properly handle certain malformed frames. A local attacker may exploit this flaw to elevate his privileges (SYSTEM) on the remote host. To exploit this flaw, an attacker would need to send a specially crafted wireless frame to the Intel driver. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22132 |
published | 2006-08-02 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22132 |
title | Intel PRO/Wireless 2100 Network Connection Driver Local Privilege Escalation Vulnerability |
code |
|
References
- http://securitytracker.com/id?1016621
- http://securitytracker.com/id?1016621
- http://support.intel.com/support/wireless/wlan/pro2100/sb/CS-023067.htm
- http://support.intel.com/support/wireless/wlan/pro2100/sb/CS-023067.htm
- http://www.kb.cert.org/vuls/id/824500
- http://www.kb.cert.org/vuls/id/824500
- http://www.securityfocus.com/bid/19299
- http://www.securityfocus.com/bid/19299
- http://www.vupen.com/english/advisories/2006/3099
- http://www.vupen.com/english/advisories/2006/3099