Intel warns of Centrino wireless driver flaws

Share this article:

Intel is reporting several vulnerabilities in its Centrino wireless drivers that could lead to remote code execution and an attacker assuming control of a system.

Flaws related to corrupt memory have been identified in the Microsoft Windows drivers for Intel 200BG and 2915ABG PRO network connection hardware, according to an Intel advisory. Hackers within range of the target's Wi-Fi station can execute arbitrary code and gain kernel-level privileges.

"The vulnerabilities are pretty awful," Mikko Hypponen, chief research officer at F-Secure, said on the company blog. "…At least in theory, somebody could write a WLAN virus that would jump from one laptop to another if the laptops are too close to each other. Patch now."

While Intel is not aware of any malicious exploitation of the flaws, the company suggests users upgrade to the latest version of network connection hardware, available on Intel's website.

Researchers from Sophos warned the IT world this week of wireless worms, which can attack mobile devices through the airwaves.

Alan Paller, director of research at the SANS Institute, says the vulnerability is significant because it erodes user's trust in their laptop. He added that because the flaw gives attackers privileged rights, they can avoid encryption.

Bugs such as this will continue to be reported in the coming months, Paller predicted.

You can expect wireless drivers to be major targets for the next three to nine months," he said.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.