what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

marvell-association.txt

marvell-association.txt
Posted Oct 13, 2008
Authored by Laurent Butti, Julien Tinnes

The wireless drivers in some Wi-Fi access points (such as the MARVELL-based Linksys WAP4400N) do not correctly parse some malformed 802.11 frames, allowing for denial of service and possible code execution.

tags | advisory, denial of service, code execution
advisories | CVE-2008-4441
SHA-256 | 1a181ff342a3f2e4a532d4f63245f3886efc056a407e5ba031eaab9f54c9e7ff

marvell-association.txt

Change Mirror Download
Title:
------
* Marvell Driver Malformed Association Request Vulnerability

Summary:
--------
* The wireless drivers in some Wi-Fi access points (such as the
MARVELL-based Linksys WAP4400N) do not correctly parse some malformed
802.11 frames.

Assigned CVE:
-------------
* CVE-2008-4441

Details:
--------
* The bug can be triggered thanks to a malformed association request
which is typically too short (truncated). Any association request sent
in the air by the attacker will be parsed by the access point wireless
driver and thus may trigger some implementation bugs. This bug is only
triggerable when the access point is in WEP mode and if the association
request contains the WEP flag.

Attack Impact:
--------------
* Denial-of-service (reboot or hang-up) and possibly remote arbitrary
code execution

Attack Vector:
--------------
* Unauthenticated wireless device

Timeline:
---------
* 2008-05-26 - Vulnerability reported to Linksys
* 2008-05-26 - Full details sent to Linksys
* 2008-10-13 - Public disclosure

Affected Products:
------------------
* Linksys WAP4400N (firmware v1.2.14) with MARVELL 88W8361P-BEM1 chipset

Vulnerable Devices:
-------------------
* As it is a wireless driver specific issue, the wireless vendor should
use the latest chipset wireless driver for their access point firmwares.
This security vulnerability was reported to Linksys, updated firmwares
(such as the 1.2.17 firmware) should be available on their web site. Any
other wireless device relying on this vulnerable wireless driver is
likely to be vulnerable.

Credits:
--------
* This vulnerability was discovered by Laurent Butti and Julien Tinnes
from France Telecom / Orange
Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close