Intel® PROSet/Wireless Software Local Information Disclosure

Intel ID:  INTEL-SA-00004
Product family:  Intel® PROSet/Wireless Software 7.x, 8.x, 9.x, 10.x
Impact of vulnerability Information Disclosure
Severity rating Moderate
Original release:  Jan 12, 2007
Last revised:  Jan 12, 2007
Summary: 

A security vulnerability exists in the Intel® PROSet/Wireless Software (PROSet application) because of insecure usage of shared memory allowing a person having access to the user’s computer or malicious software installed on the user’s computer to obtain access to users’ wireless network security information.

Description: 

A security vulnerability has been identified in Intel® PROSet/Wireless Software 7.x, 8.x, 9.x, and 10.x (PROSet application), which could be locally exploited by malicious users or software to obtain Wireless network security information such as WLAN pre-shared WEP key (all PROSet versions) and user authentication credentials (only PROSet 9.x and 10.x versions). This flaw is due to insecure usage of the shared memory.

Affected products: 

Product

Application Versions

Affected Versions

Intel® PRO/Wireless 2100 Network Connection Intel® PROSet 7 All Prior to 7.1.4.6
Intel® PRO/Wireless 2200BG Network Connection Intel® PROSet/Wireless 8, 9, 10 All Prior to 10.5
Intel® PRO/Wireless 2915ABG Network Connection Intel® PROSet/Wireless 9, 10 All Prior to 10.5
Intel® PRO/Wireless 3945ABG Network Connection Intel® PROSet/Wireless 10 Intel® PROSet/Wireless 10

Note: The 10.x software releases support all products which are supported by the 8.x and 9.x releases and is a direct replacement for these releases.

Applications written to the Intel® PRO/Wireless Network Connection Software API which utilize the API to apply WLAN profiles are also affected by this vulnerability. Intel recommends customers contact their OEM for an updated version of the OEM’s WLAN application.

Recommendations: 

This issue has been reported publicly with demonstration code. Intel recommends that users update the Intel® PROSet/Wireless Software. In order to determine the version of Intel® PROSet/Wireless Software you have installed on your system, open the PROSet main page and select Help ? About from the menu bar on the top of the page.

The following URL contains links to the software release which resolves the vulnerability: http://support.intel.com/support/wireless/wlan/sb/cs-010623.htm.

Acknowledgements: 

Intel would like to thank Rubén Santamarta for working with us.

Related Information: 

Original disclosure http://www.reversemode.com/index.php?option=com_content&task=view&id=10&Itemid=1.

BugTraq Mailing List, Tue May 02 2006 - 13:59:54 CDT, Intel wireless service s24evmon.exe confidential information disclosure at http://archives.neohapsis.com/archives/bugtraq/2006-05/0116.html.

FrSIRT Security Advisory FrSIRT/ADV-2006-1737, Intel PROset/Wireless Software Insecure Shared Section Information Disclosure at http://www.frsirt.com/english/advisories/2006/1737.


Revision history: 

Revision
Date
Description
1.0
12-January-2007
Migrating existing content to new Intel Product Security Center.

CVE Name:  CVE-2006-2316

Disclaimer:

INFORMATION IN THIS DOCUMENT IS PROVIDED “AS IS” IN CONNECTION WITH INTEL® PRODUCTS. YOUR USE OF THE INFORMATION IN THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. INTEL RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. EXCEPT AS PROVIDED IN INTEL’S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT.



Reporting a security issue

If you have information about a security issue or vulnerability with an Intel product, please send an e-mail to secure@intel.com. Encrypt sensitive information using our PGP public key.

For issues related to Intel managed open source projects, please visit http://www.01.org/security.

Please provide as much information as possible, including:

  • The products and versions affected
  • Detailed description of the vulnerability
  • Information on known exploits

  • A member of the Intel Product Security Team will review your e-mail and contact you to collaborate on resolving the issue. For more information on how Intel works to resolve security issues, see:

  • Vulnerability handling guidelines

  • Need product support?
    The secure@intel.com e-mail address should only be used for reporting security issues.

    If you...
  • Have questions about the security features of an Intel product
  • Require technical support
  • Want product updates or patches

  • Please visit Support & Downloads.