CVE-2002-0214
CVSS2.1
发布时间 :2002-05-16 00:00:00
修订时间 :2008-09-10 20:00:43
NMCOS    

[原文]Compaq Intel PRO/Wireless 2011B LAN USB Device Driver 1.5.16.0 through 1.5.18.0 stores the 128-bit WEP (Wired Equivalent Privacy) key in plaintext in a registry key with weak permissions, which allows local users to decrypt network traffic by reading the WEP key from the registry key.


[CNNVD]Compaq Intel PRO/Wireless 2011B局域网USB设备驱动信息泄露漏洞(CNNVD-200205-015)

        
        Compaq's Intel PRO/Wireless 2011B局域网USB设备驱动程序可以使一个用户通过USB接口连接局域网上一些支持WLAN的以太网设备。程序运行于那些支持USB的Windows版本,比如Windows 98/ME/2000。
        此USB设备驱动程序设计上存在漏洞,可以使本地攻击者轻易地得到128-bit位的WEP Key。
        用于加密WEP通讯的WEP Key被驱动程序以明文的形式存放在系统的注册表中,任何本地用户都可以轻松地用任何注册表访问工具读取这个明文的Key。攻击者得到这个Key可以解密所有用WEP包装的网络通讯。
        

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:intel:intel_pro_wireless_2011b_lan_usb_device_driver:1.5.18.0
cpe:/o:intel:intel_pro_wireless_2011b_lan_usb_device_driver:1.5.16.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0214
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0214
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200205-015
(官方数据源) CNNVD

- 其它链接及资源

http://www.iss.net/security_center/static/8015.php
(VENDOR_ADVISORY)  XF  intel-wlan-wep-plaintext(8015)
http://online.securityfocus.com/archive/1/252607
(VENDOR_ADVISORY)  BUGTRAQ  20020128 Intel WLAN Driver storing 128bit WEP-Key in plain text!
http://www.securityfocus.com/bid/3968
(UNKNOWN)  BID  3968

- 漏洞信息

Compaq Intel PRO/Wireless 2011B局域网USB设备驱动信息泄露漏洞
低危 设计错误
2002-05-16 00:00:00 2005-10-20 00:00:00
本地  
        
        Compaq's Intel PRO/Wireless 2011B局域网USB设备驱动程序可以使一个用户通过USB接口连接局域网上一些支持WLAN的以太网设备。程序运行于那些支持USB的Windows版本,比如Windows 98/ME/2000。
        此USB设备驱动程序设计上存在漏洞,可以使本地攻击者轻易地得到128-bit位的WEP Key。
        用于加密WEP通讯的WEP Key被驱动程序以明文的形式存放在系统的注册表中,任何本地用户都可以轻松地用任何注册表访问工具读取这个明文的Key。攻击者得到这个Key可以解密所有用WEP包装的网络通讯。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 手工设定相关注册表项的访问权限,确认只有合法用户才能访问表项。
        厂商补丁:
        Compaq
        ------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.compaq.com/support/files/

- 漏洞信息

11314
Compaq Intel PRO/Wireless 2011B LAN USB Device Driver WEP Key Local Disclosure
Wireless Vector

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-01-28 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Compaq Intel PRO/Wireless 2011B LAN USB Device Driver Information Disclosure Vulnerability
Design Error 3968
No Yes
2002-01-28 12:00:00 2009-07-11 09:56:00
This vulnerability was submitted to BugTraq on January 28th, 2002 by dario luethi <dlu@remote-exploit.org>.

- 受影响的程序版本

Compaq Intel PRO/Wireless 2011B LAN USB Device Driver 1.5.18 .0
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
Compaq Intel PRO/Wireless 2011B LAN USB Device Driver 1.5.16 .0
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows ME
- Microsoft Windows XP Home
- Microsoft Windows XP Professional

- 漏洞讨论

Compaq's Intel PRO/Wireless 2011B LAN USB Device driver allows a user to connect a number of supported WLAN Ethernet devices via a USB port. It runs on Microsoft Windows platforms that support USB, such as Windows 98/ME/2000.

The Compaq Intel PRO/Wireless 2011B LAN USB Device driver may disclose sensitive information to local attackers. The 128-bit WEP (Wired Equivalent Privacy) Key is stored plaintext in the registry and may be viewed by unprivileged local users.

The WEP Key may be used by the local attacker to decrypt all network traffic encapsulated in WEP.

- 漏洞利用

There is no exploit required.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站