Vulnerability Description
Multiple buffer overflows in the Marvell wireless driver, as used in Linksys WAP4400N Wi-Fi access point with firmware 1.2.17 on the Marvell 88W8361P-BEM1 chipset, and other products, allow remote 802.11-authenticated users to cause a denial of service (wireless access point crash) and possibly execute arbitrary code via an association request with long (1) rates, (2) extended rates, and unspecified other information elements.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Marvell | 88W8361P-Bem Chipset | All versions |
| Linksys | Wap4400N | 1.2.17 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/37345
- http://www.securityfocus.com/archive/1/507781/100/0/threaded
- http://www.vupen.com/english/advisories/2009/3239
- http://secunia.com/advisories/37345
- http://www.securityfocus.com/archive/1/507781/100/0/threaded
- http://www.vupen.com/english/advisories/2009/3239
FAQ
What is CVE-2007-5475?
CVE-2007-5475 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple buffer overflows in the Marvell wireless driver, as used in Linksys WAP4400N Wi-Fi access point with firmware 1.2.17 on the Marvell 88W8361P-BEM1 chipset, and other products, allow remote 802...
How severe is CVE-2007-5475?
CVE-2007-5475 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5475?
Check the references section above for vendor advisories and patch information. Affected products include: Marvell 88W8361P-Bem Chipset, Linksys Wap4400N.