First published: Thu Nov 12 2009(Updated: )
Multiple buffer overflows in the Marvell wireless driver, as used in Linksys WAP4400N Wi-Fi access point with firmware 1.2.17 on the Marvell 88W8361P-BEM1 chipset, and other products, allow remote 802.11-authenticated users to cause a denial of service (wireless access point crash) and possibly execute arbitrary code via an association request with long (1) rates, (2) extended rates, and unspecified other information elements.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Marvell 88W8361P-BEM Chipset | ||
Cisco WAP4400N Firmware | =1.2.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5475 is considered a high-severity vulnerability due to its potential to cause denial of service on affected devices.
To mitigate CVE-2007-5475, it is recommended to upgrade the firmware of the affected Marvell wireless driver to a patched version if available.
CVE-2007-5475 affects the Marvell 88W8361P-BEM chipset and specifically the Linksys WAP4400N Wi-Fi access point running firmware version 1.2.17.
CVE-2007-5475 allows remote, authenticated users to exploit buffer overflows, potentially leading to a crash of the wireless access point.
Yes, CVE-2007-5475 can be exploited by remote 802.11-authenticated users, resulting in the denial of service of the affected wireless access point.