First published: Tue Nov 14 2006(Updated: )
Stack-based buffer overflow in the Broadcom BCMWL5.SYS wireless device driver 3.50.21.10, as used in Cisco Linksys WPC300N Wireless-N Notebook Adapter before 4.100.15.5 and other products, allows remote attackers to execute arbitrary code via an 802.11 response frame containing a long SSID field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WPC300N Wireless-N Notebook Adapter Driver | ||
Broadcom BCMWL5.SYS | =3.50.21.10 | |
=3.50.21.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5882 has a high severity rating due to its potential for remote code execution.
To mitigate CVE-2006-5882, it is recommended to update the Broadcom BCMWL5.SYS wireless device driver to version 4.100.15.5 or later.
CVE-2006-5882 affects the Cisco Linksys WPC300N Wireless-N Notebook Adapter and possibly other devices using the vulnerable Broadcom driver.
CVE-2006-5882 is classified as a stack-based buffer overflow vulnerability.
Yes, CVE-2006-5882 can be exploited remotely by sending a specially crafted 802.11 response frame.