My next class:

*Intel Centrino Vulnerabilities

Published: 2006-08-01. Last Updated: 2006-08-02 22:13:46 UTC
by Johannes Ullrich (Version: 2)
0 comment(s)

Intel has released driver security updates for Centrino device drivers for Windows and for the PROSet management software.
http://support.intel.com/support/wireless/wlan/sb/CS-023068.htm

There are three issues identified:
Intel® Centrino Wireless Driver Malformed Frame Remote Code Execution
http://support.intel.com/support/wireless/wlan/sb/CS-023065.htm
Intel® PROSet/Wireless Software Local Information Disclosure
http://support.intel.com/support/wireless/wlan/sb/CS-023066.htm
Intel® Centrino Wireless Driver Malformed Frame Privilege Escalation
http://support.intel.com/support/wireless/wlan/pro2100/sb/CS-023067.htm

The first and the third seem to be most severe. At this point we don't know of any public exploits for these vulnerabilities. The second one (PROSet info disclosure) has been around for a while and is known but local only.

The announcements contain details on which drivers are vulnerable as well as links to patches and a tool to determine which version you have-
http://support.intel.com/support/wireless/wlan/sb/cs-005905.htm

Below are the summaries of the affected platforms
Intel® Centrino Wireless Driver Malformed Frame Remote Code Execution
    * Intel® PRO/Wireless 2200BG Network Connection
    * Intel® PRO/Wireless 2915ABG Network Connection

Intel® PROSet/Wireless Software Local Information Disclosure
    * Intel® PRO/Wireless 2100 Network Connection
    * Intel® PRO/Wireless 2200BG Network Connection
    * Intel® PRO/Wireless 2915ABG Network Connection
    * Intel® PRO/Wireless 3945ABG Network Connection

Intel® Centrino Wireless Driver Malformed Frame Privilege Escalation
    * Intel® PRO/Wireless 2100 Network Connection

The details of which drivers are listed on the pages and we recommend you look there.

As far as we know, these will not be delivered via the Microsoft Update tool. You will need to download and install them manually unless your system vendor (the folk who make your laptop) provides an automated tool for you. Before you download and install these, we strongly suggest you talk to your system vendors and see if they are coming out with custom versions of the patches.

On a related note- there will be a talk on exploiting device drivers on Wednesday 8/2/06 at Blackhat Vegas. Anyone who can make it should go.
Update 8/2/06: Brian Krebs has added a nice article on MacBook "wireless driver fu" to his SecurityFix blog, see http://blog.washingtonpost.com/securityfix/2006/08/hijacking_a_macbook_in_60_seco_1.html

Keywords:
0 comment(s)
My next class:

Comments


Diary Archives