First published: Wed Nov 22 2006(Updated: )
Stack-based buffer overflow in A5AGU.SYS 1.0.1.41 for the D-Link DWL-G132 wireless adapter allows remote attackers to execute arbitrary code via a 802.11 beacon request with a long Rates information element (IE).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DWL-G132 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6055 has a high severity due to the potential for remote code execution.
To fix CVE-2006-6055, update the D-Link DWL-G132 wireless adapter driver to a version that is not vulnerable.
CVE-2006-6055 is caused by a stack-based buffer overflow in A5AGU.SYS when processing long Rates information elements from 802.11 beacon requests.
The potential impacts of CVE-2006-6055 include arbitrary code execution, which can lead to system compromise.
CVE-2006-6055 affects the D-Link DWL-G132 wireless adapter with A5AGU.SYS version 1.0.1.41.