CVE-2006-6055

Stack-based buffer overflow in A5AGU.SYS 1.0.1.41 for the D-Link DWL-G132 wireless adapter allows remote attackers to execute arbitrary code via a 802.11 beacon request with a long Rates information element (IE).
Configurations

Configuration 1 (hide)

cpe:2.3:h:d-link:dwl-g132:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:21

Type Values Removed Values Added
References () http://projects.info-pull.com/mokb/MOKB-13-11-2006.html - Vendor Advisory () http://projects.info-pull.com/mokb/MOKB-13-11-2006.html - Vendor Advisory
References () http://secunia.com/advisories/22860 - () http://secunia.com/advisories/22860 -
References () http://securitytracker.com/id?1017215 - () http://securitytracker.com/id?1017215 -
References () http://www.securityfocus.com/bid/21032 - () http://www.securityfocus.com/bid/21032 -
References () http://www.vupen.com/english/advisories/2006/4488 - () http://www.vupen.com/english/advisories/2006/4488 -

Information

Published : 2006-11-22 01:07

Updated : 2024-11-21 00:21


NVD link : CVE-2006-6055

Mitre link : CVE-2006-6055

CVE.ORG link : CVE-2006-6055


JSON object : View

Products Affected

d-link

  • dwl-g132