A vulnerability has been reported in NetGear WG111v2 wireless driver, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in the WG111v2.SYS driver when handling beacon requests. This can be exploited to cause a stack-based buffer overflow via a malicious beacon request containing more than 1100 bytes of information elements.
Successful exploitation allows execution of arbitrary code.
The vulnerability is reported in version 5.1213.6.316 of the WG111v2.SYS driver. Other versions may also be affected.
Solution: Turn off the wireless card when not in use to reduce the risk.
Provided and/or discovered by: H D Moore
Original Advisory: http://projects.info-pull.com/mokb/MOKB-16-11-2006.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org