In association with heise online

24 January 2009, 12:49

Vulnerability in Ralink Technology wireless driver

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

A vulnerability has been discovered in the driver of a Ralink wireless card that can be exploited to crash the computers involved. Secunia adds that it has the potential to allow arbitrary code to be run in kernel mode. Attackers only have to insert a specially crafted wireless network name (SSID) in a probe request packet, and need not know the SSID or MAC address of targeted machines. Probe requests containing SSID parameters between 128 and 256 bytes in length will cause an integer overflow in a target system, if the card is running in the, albeit less commonly used, ad hoc mode.

The vulnerability has been found on Windows 2000 systems with the Ralink RT73 V3.08 wireless USB stick and the latest driver, but other Ralink devices and operating systems may also be affected. Ralink has not yet provided a bugfix; Secunia advises against using ad hoc mode.

See also:


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit