SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Apple AirPort Vendors:   Apple
Apple AirPort Card May Connect to Malicious Networks
SecurityTracker Alert ID:  1014522
SecurityTracker URL:  http://securitytracker.com/id/1014522
CVE Reference:   CVE-2005-2196   (Links to External Site)
Updated:  Jun 15 2008
Original Entry Date:  Jul 19 2005
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 4.2
Description:   A vulnerability was reported in Apple's AirPort card software. The card may automatically connect to a malicious wireless network.

If the AirPort card is enabled but not connected to a known or trusted network, the card attempts to connect to a randomly generated network number (ostensibly a non-existent network) using a default WEP key. A remote user can create a network that uses the same WEP key to cause AirPort cards to connect to the network.

AirPort Extreme is not affected.

The vendor credits Dino Dai Zovi with reporting this vulnerability.

Impact:   The system may connect to a malicious network without warning.
Solution:   The vendor has issued a fixed version (4.2), available from the Software Update pane in System Preferences or from Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

For Mac OS X v10.3.3 through Mac OS X v10.3.9
The download file is named: "AirPortSW42.dmg"
Its SHA-1 digest is: bf2876b1873392e64b2e1061b835d35bfb67c3a6

The AirPort security fix is also contained within the
Mac OS X v10.4.2 update:

If updating from Mac OS X v10.4.1
The download file is named: "MacOSXUpdate10.4.2.dmg"
Its SHA-1 digest is: 5a11375c29f1f656061189b9467cf9291153de46

If updating from Mac OS X v10.4
The download file is named: "MacOSXUpdateCombo10.4.2.dmg"
Its SHA-1 digest is: 5149def0b79f030bdb2763283c376e4d87d085e9

Vendor URL:  www.apple.com/ (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  UNIX (macOS/OS X)
Underlying OS Comments:  10.4.2 and prior versions

Message History:   None.


 Source Message Contents

Subject:  APPLE-SA-2005-07-19 AirPort 4.2


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2005-07-19 AirPort 4.2

AirPort 4.2 is now available and delivers the following security
enhancement:

Available for:  Mac OS X 10.3.3 to Mac OS X 10.3.9, and Mac OS X
10.4.2
CVE-ID:  CAN-2005-2196
Impact:  Mobile users with the original AirPort card enabled could
automatically associate to an malicious network
Description: When not connected to a known or trusted network, the
AirPort card "parks" on a randomly generated network with a default
WEP key.  This can allow parked AirPort cards to automatically
connect to malicious networks without warning.  This condition only
applies to AirPort cards and does not affect AirPort Extreme.  The
System Profiler utility can be used to indicate the type of AirPort
card installed.  This update addresses the problem by using a
randomly-generated 128-bit WEP key instead of the default WEP key.
Credit to Dino Dai Zovi for reporting this issue.

AirPort 4.2 may be obtained from the Software Update pane in
System Preferences, or Apple's Software Downloads web site:
http://www.apple.com/support/downloads/

For Mac OS X v10.3.3 through Mac OS X v10.3.9
The download file is named:  "AirPortSW42.dmg"
Its SHA-1 digest is:  bf2876b1873392e64b2e1061b835d35bfb67c3a6

The AirPort security fix is also contained within the
Mac OS X v10.4.2 update:

If updating from Mac OS X v10.4.1
The download file is named:  "MacOSXUpdate10.4.2.dmg"
Its SHA-1 digest is:  5a11375c29f1f656061189b9467cf9291153de46

If updating from Mac OS X v10.4
The download file is named:  "MacOSXUpdateCombo10.4.2.dmg"
Its SHA-1 digest is:  5149def0b79f030bdb2763283c376e4d87d085e9

Information will also be posted to the Apple Product Security
web site:
http://docs.info.apple.com/article.html?artnum=61798

This message is signed with Apple's Product Security PGP key,
and details are available at:
http://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQEVAwUBQt0uX4HaV5ucd/HdAQJnOQf+JLtyvWFB+Y8sDkiN4VB2MQN2LURiyAUp
hGng/+F2JN1Y4AV1gD2eSqIvi4MYuaINiF0lrzGCmANxcX9S8VrHzRy21rrDKGNU
3RTaq1ZDHV4or9+ZznkWzJXEDAeLKprhYqhvpEyKGEQAUAxamXxBGB8Cfne5FDzA
qb+JeGO0vV5S/d0XTs4KXzuX06QkNsZ8G01F7hsZ+LeRRqdA08ZQrK0NihDc+l/j
QXSprcPqJQmYQciQycyPHLed3XWoXSbVE53NTbfa4ahxqwd9ldJAKyUZwOhW0Y1D
vCSUcEnV2RA2+ckuW6cPWxzwxzMhQ7xqTA1DT6VAtVfbrJZ5PICnPw==
=9ogg
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC