Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Wireless 802.11 (Generic) Vendors:   D-Link Systems, Inc.
D-Link DWL-G132 Wireless USB Adapter Stack Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017215
SecurityTracker URL:
CVE Reference:   CVE-2006-6055   (Links to External Site)
Updated:  May 30 2008
Original Entry Date:  Nov 13 2006
Impact:   Execution of arbitrary code via network, Root access via network
Exploit Included:  Yes  
Version(s): A5AGU.SYS driver version
Description:   A vulnerability was reported in the D-Link DWL-G132 wireless USB adapter. A remote user can execute arbitrary code on the target system.

A remote user on the wireless network can send an 802.11 beacon request containing a specially crafted rates information element field value to trigger a stack overflow in the 'A5AGU.SYS' driver and execute arbitrary code on the target system. The code will run with kernel level privileges on the target service.

H D Moore discovered this vulnerability.

The original advisory is available at:

Impact:   A remote user on the wireless network can execute arbitrary code on the target system.
Solution:   No solution was available at the time of this entry.

The original advisory contains the following unofficial workaround [quoted]:

"To install a patched version of the A5AGU.SYS driver, first install the WUA-2340 driver from the link below [], then re-install the DWL-G132 driver. Browse to the WUA-2340 installation path, find the Drivers subdirectory, and copy all of these files (at least, the .SYS and .BIN files), to your Windows\System32\Drivers directory, overwriting the existing files with the same name. Finally, reboot your system."

Vendor URL: (Links to External Site)
Cause:   Boundary error

Message History:   None.

 Source Message Contents

Subject:  [Full-disclosure] Wireless fun!

Shiny new (remote) kernel-mode exploits for Metasploit 3:


Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC