You are here: hacking technology > System crack > Content
Hot Articles
Recommend Articles
New Articles
NETGEAR WN802T wireless junction point EAPoL key length buffer overflow crack
  Add date: 10/21/2008   Publishing date: 10/21/2008   Hits: 152

Issues the date: 2008-09-04
Renewal date: 2008-09-05

Is affected the system:
Netgear WN802T 1.3.16
Description:
--------------------------------------------------------------------------------
BUGTRAQ ID: 31013
CVE(CAN) ID: CVE-2008-1144

NETGEAR WN802T is a section of small tetherless access equipment.

Equipment has not analyzed the EAPoL-Key text which correctly based on Marvell 88W8361P-BEM1 chip set's NETGEAR the WN802T the user transmits, may contain through 802.11 authentication's users to the junction point transmission has the ultra long length field EAPoL-Key text triggering buffer overflow, causes to refuse to serve or to carry out the random order.

<* origin: Laurent Butti (laurent.butti@orange-ftgroup.com)
        Julien Tinnes
 
  Link: http://marc.info/?l=bugtraq&m=122054466401860&w=2
        http://secunia.com/advisories/31770/
*>

Suggested:
--------------------------------------------------------------------------------
Manufacturer patch:

Netgear
-------
At present the manufacturer had already issued the promotion patch repairs this security problem, welcome to manufacturer main page downloading:

http://www.netgear.com/
 


Prev:Linksys the WRT350N information unit long-distance refuses to serve the crack Next:Marvell 88W8361P-BEM1 chip set NETGEAR WN802T long-distance refuses to serve the crack

Comment:

Category: Home > System crack