Vulnerabilioty In Ralink Technology Wireless Driver


Recommended Posts

Jan 24 2009

Vulnerability in Ralink Technology wireless driver

A vulnerability has been discovered in the driver of a Ralink wireless card that can be exploited to crash the computers involved. Secunia adds that it has the potential to allow arbitrary code to be run in kernel mode. Attackers only have to insert a specially crafted wireless network name (SSID) in a probe request packet, and need not know the SSID or MAC address of targeted machines. Probe requests containing SSID parameters between 128 and 256 bytes in length will cause an integer overflow in a target system, if the card is running in the, albeit less commonly used, ad hoc mode.

The vulnerability has been found on Windows 2000 systems with the Ralink RT73 V3.08 wireless USB stick and the latest driver, but other Ralink devices and operating systems may also be affected. Ralink has not yet provided a bugfix; Secunia advises against using ad hoc mode. See also:

(djwm)

Heise security: http://www.heise-online.co.uk/security/Vul...r--/news/112480

>>>>>>>>>>>>>>>>>>>>>>

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...