First published: Tue Oct 14 2008(Updated: )
The Marvell driver for the Linksys WAP4400N Wi-Fi access point with firmware 1.2.14 on the Marvell 88W8361P-BEM1 chipset, when WEP mode is enabled, does not properly parse malformed 802.11 frames, which allows remote attackers to cause a denial of service (reboot or hang-up) via a malformed association request containing the WEP flag, as demonstrated by a request that is too short, a different vulnerability than CVE-2008-1144 and CVE-2008-1197.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys WAP400N | =1.2.14 | |
Marvell 88W8361P-BEM1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4441 is classified as a medium severity vulnerability due to the potential for denial of service attacks.
To mitigate CVE-2008-4441, upgrade to a revised firmware version that addresses this vulnerability.
CVE-2008-4441 affects the Linksys WAP4400N Wi-Fi access point running firmware version 1.2.14.
CVE-2008-4441 allows remote attackers to cause a denial of service by sending malformed 802.11 frames.
Yes, CVE-2008-4441 specifically occurs when WEP mode is enabled on the affected devices.