Intel warns of Centrino wireless driver flaws

Share this article:

Intel is reporting several vulnerabilities in its Centrino wireless drivers that could lead to remote code execution and an attacker assuming control of a system.

Flaws related to corrupt memory have been identified in the Microsoft Windows drivers for Intel 200BG and 2915ABG PRO network connection hardware, according to an Intel advisory. Hackers within range of the target's Wi-Fi station can execute arbitrary code and gain kernel-level privileges.

"The vulnerabilities are pretty awful," Mikko Hypponen, chief research officer at F-Secure, said on the company blog. "…At least in theory, somebody could write a WLAN virus that would jump from one laptop to another if the laptops are too close to each other. Patch now."

While Intel is not aware of any malicious exploitation of the flaws, the company suggests users upgrade to the latest version of network connection hardware, available on Intel's website.

Researchers from Sophos warned the IT world this week of wireless worms, which can attack mobile devices through the airwaves.

Alan Paller, director of research at the SANS Institute, says the vulnerability is significant because it erodes user's trust in their laptop. He added that because the flaw gives attackers privileged rights, they can avoid encryption.

Bugs such as this will continue to be reported in the coming months, Paller predicted.

You can expect wireless drivers to be major targets for the next three to nine months," he said.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

CryptoWall surpasses CryptoLocker in infection rates

CryptoWall surpasses CryptoLocker in infection rates

A threat analysis from Dell SecureWorks CTU says that CryptoWall has picked up where its famous sibling left off.

Professor says Google search, not hacking, yielded medical info

Professor says Google search, not hacking, yielded medical ...

A professor of ethical hacking at City College San Francisco came forward to clarify that he did not demonstrate hacking a medical center's server in a class.

Syrian Malware Team makes use of enhanced BlackWorm RAT

Syrian Malware Team makes use of enhanced BlackWorm ...

FireEye analyzed the hacking group's use of the malware, dubbed the "Dark Edition" of BlackWorm.