VAR-200708-0003
Vulnerability from variot - Updated: 2023-12-18 13:53Unspecified vulnerability in Atheros 802.11 a/b/g wireless adapter drivers before 5.3.0.35, and 6.x before 6.0.3.67, on Windows allows remote attackers to cause a denial of service via a crafted 802.11 management frame. Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition. Atheros Provided by the company Microsoft Windows The wireless network driver for is vulnerable to the frame handling part. Crafted 802.11 Sending a management frame causes a buffer overflow, resulting in service disruption ( DoS ) You may be attacked. 802.11b, 802.11g, 802.11n Management frames in are not encrypted and do not require authentication to be sent. further, WEP And WPA It has been found that even if wireless communication encryption such as is affected by this vulnerability. Linux And UNIX Used in NDISWrapper And using vulnerable drivers with similar technologies may also be affected.
The driver did not adequately check for malformed management frames, and a remote attacker could trigger an overflow by sending a specially constructed 802.11 management frame that requires no authentication or encryption. Atheros drivers are also used by OEM (Original Equipment Manufacturer) wireless adapters. This issue is reported to affect drivers for the Windows operating system.
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.
SOLUTION: The vendor has reportedly issued firmware updates (versions 5.3.0.35 and 6.0.3.67 and later) to OEMs.
PROVIDED AND/OR DISCOVERED BY: Reported via US-CERT.
ORIGINAL ADVISORY: US-CERT VU#730169: http://www.kb.cert.org/vuls/id/730169
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200708-0003",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "all windows",
"scope": "eq",
"trust": 1.0,
"vendor": "microsoft",
"version": "*"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "atheros",
"version": null
},
{
"model": "driver",
"scope": "eq",
"trust": 0.8,
"vendor": "atheros",
"version": "version 5.3.0 system (atheros 802.11 a/b/g)"
},
{
"model": "driver",
"scope": "eq",
"trust": 0.8,
"vendor": "atheros",
"version": "version 6.0.3 system (atheros 802.11 a/b/g)"
},
{
"model": "celsius work station",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "fmv desktop",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "fmv thin client",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "fmv-biblo",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "fmv-biblo loox",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "fmv-deskpower",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "fmv-esprimo",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "fmv-lifebook",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": "fmv-stylistic",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.6,
"vendor": "none",
"version": null
},
{
"model": "wireless adapter drivers",
"scope": "eq",
"trust": 0.6,
"vendor": "atheros",
"version": "6.0.3.67"
},
{
"model": "wireless adapter drivers",
"scope": "eq",
"trust": 0.6,
"vendor": "atheros",
"version": "5.1.1.9"
},
{
"model": "communications wireless driver a/b/g",
"scope": "eq",
"trust": 0.3,
"vendor": "atheros",
"version": "802.110"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#730169"
},
{
"db": "CNVD",
"id": "CNVD-2007-4814"
},
{
"db": "BID",
"id": "25160"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000565"
},
{
"db": "NVD",
"id": "CVE-2007-2927"
},
{
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:atheros:wireless_adapter_drivers:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.1.1.9",
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:atheros:wireless_adapter_drivers:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.0.3.67",
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-2927"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Nicholas Krasny",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
],
"trust": 0.6
},
"cve": "CVE-2007-2927",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2007-2927",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-26289",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2007-2927",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#730169",
"trust": 0.8,
"value": "0.77"
},
{
"author": "CNNVD",
"id": "CNNVD-200708-075",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-26289",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#730169"
},
{
"db": "VULHUB",
"id": "VHN-26289"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000565"
},
{
"db": "NVD",
"id": "CVE-2007-2927"
},
{
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unspecified vulnerability in Atheros 802.11 a/b/g wireless adapter drivers before 5.3.0.35, and 6.x before 6.0.3.67, on Windows allows remote attackers to cause a denial of service via a crafted 802.11 management frame. Atheros wireless drivers fail to properly handle malformed wireless frames. This vulnerability may allow a remote, unauthenticated attacker to create a denial-of-service condition. Atheros Provided by the company Microsoft Windows The wireless network driver for is vulnerable to the frame handling part. Crafted 802.11 Sending a management frame causes a buffer overflow, resulting in service disruption ( DoS ) You may be attacked. 802.11b, 802.11g, 802.11n Management frames in are not encrypted and do not require authentication to be sent. further, WEP And WPA It has been found that even if wireless communication encryption such as is affected by this vulnerability. Linux And UNIX Used in NDISWrapper And using vulnerable drivers with similar technologies may also be affected. \n\n\u00a0The driver did not adequately check for malformed management frames, and a remote attacker could trigger an overflow by sending a specially constructed 802.11 management frame that requires no authentication or encryption. \nAtheros drivers are also used by OEM (Original Equipment Manufacturer) wireless adapters. \nThis issue is reported to affect drivers for the Windows operating system. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nSOLUTION:\nThe vendor has reportedly issued firmware updates (versions 5.3.0.35\nand 6.0.3.67 and later) to OEMs. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported via US-CERT. \n\nORIGINAL ADVISORY:\nUS-CERT VU#730169:\nhttp://www.kb.cert.org/vuls/id/730169\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-2927"
},
{
"db": "CERT/CC",
"id": "VU#730169"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000565"
},
{
"db": "CNVD",
"id": "CNVD-2007-4814"
},
{
"db": "BID",
"id": "25160"
},
{
"db": "VULHUB",
"id": "VHN-26289"
},
{
"db": "PACKETSTORM",
"id": "58395"
}
],
"trust": 3.33
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#730169",
"trust": 3.7
},
{
"db": "NVD",
"id": "CVE-2007-2927",
"trust": 3.4
},
{
"db": "SECUNIA",
"id": "26348",
"trust": 2.7
},
{
"db": "BID",
"id": "25160",
"trust": 2.0
},
{
"db": "VUPEN",
"id": "ADV-2007-2756",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "37992",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000565",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2007-4814",
"trust": 0.6
},
{
"db": "XF",
"id": "35788",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200708-075",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-26289",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "58395",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#730169"
},
{
"db": "CNVD",
"id": "CNVD-2007-4814"
},
{
"db": "VULHUB",
"id": "VHN-26289"
},
{
"db": "BID",
"id": "25160"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000565"
},
{
"db": "PACKETSTORM",
"id": "58395"
},
{
"db": "NVD",
"id": "CVE-2007-2927"
},
{
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
]
},
"id": "VAR-200708-0003",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-26289"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T13:53:59.244000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.atheros.com/"
},
{
"title": "Atheros\u793e\u88fd\u7121\u7dda\uff08\u30ef\u30a4\u30e4\u30ec\u30b9\uff09LAN\u30c9\u30e9\u30a4\u30d0\u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b",
"trust": 0.8,
"url": "http://www.fmworld.net/biz/common/atheros/wlan/"
},
{
"title": "VU#730169",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/vu730169.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000565"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-2927"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.9,
"url": "http://www.kb.cert.org/vuls/id/730169"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/25160"
},
{
"trust": 1.7,
"url": "http://osvdb.org/37992"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/26348"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/2756"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35788"
},
{
"trust": 0.9,
"url": "http://secunia.com/advisories/26348/"
},
{
"trust": 0.8,
"url": "http://www.atheros.com/contact/index.html"
},
{
"trust": 0.8,
"url": "http://standards.ieee.org/announcements/pr_frames.html"
},
{
"trust": 0.8,
"url": "http://standards.ieee.org/getieee802/download/802.11-1999.pdf"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2927"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu%23730169/index.html"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2927"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2007/2756"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/35788"
},
{
"trust": 0.3,
"url": "http://www.atheros.com"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "https://psi.secunia.com/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/15189/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#730169"
},
{
"db": "VULHUB",
"id": "VHN-26289"
},
{
"db": "BID",
"id": "25160"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000565"
},
{
"db": "PACKETSTORM",
"id": "58395"
},
{
"db": "NVD",
"id": "CVE-2007-2927"
},
{
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#730169"
},
{
"db": "CNVD",
"id": "CNVD-2007-4814"
},
{
"db": "VULHUB",
"id": "VHN-26289"
},
{
"db": "BID",
"id": "25160"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000565"
},
{
"db": "PACKETSTORM",
"id": "58395"
},
{
"db": "NVD",
"id": "CVE-2007-2927"
},
{
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-08-01T00:00:00",
"db": "CERT/CC",
"id": "VU#730169"
},
{
"date": "2007-08-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2007-4814"
},
{
"date": "2007-08-08T00:00:00",
"db": "VULHUB",
"id": "VHN-26289"
},
{
"date": "2007-08-01T00:00:00",
"db": "BID",
"id": "25160"
},
{
"date": "2007-08-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000565"
},
{
"date": "2007-08-10T02:01:07",
"db": "PACKETSTORM",
"id": "58395"
},
{
"date": "2007-08-08T01:17:00",
"db": "NVD",
"id": "CVE-2007-2927"
},
{
"date": "2007-08-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-12-12T00:00:00",
"db": "CERT/CC",
"id": "VU#730169"
},
{
"date": "2007-08-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2007-4814"
},
{
"date": "2017-07-29T00:00:00",
"db": "VULHUB",
"id": "VHN-26289"
},
{
"date": "2007-08-02T20:55:00",
"db": "BID",
"id": "25160"
},
{
"date": "2007-11-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000565"
},
{
"date": "2017-07-29T01:31:50.957000",
"db": "NVD",
"id": "CVE-2007-2927"
},
{
"date": "2007-08-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Atheros wireless network drivers may fail to properly handle malformed frames",
"sources": [
{
"db": "CERT/CC",
"id": "VU#730169"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200708-075"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.