It's true that affected wireless card vendors responded relatively quickly to the exploits and introduced updated drivers without the previous buffer overflows. Most vendors, however, haven’t made the drivers overly easy to find, although that is changing. Click these links to find the new drivers for Dell, Intel, and Linksys.
My gut feeling tells me that this round of wireless exploits won’t be the next Slammer or Code Red, but who wants to be exploited by some jerk or professional criminal while computing in an airport or using a laptop in your own building? It’s better to get patched.
Take an inventory of all your wireless devices: wireless access points, wireless PCMCIA cards, built-in wireless chipsets, etc. Find out the driver version numbers or dates, and then search the related vendor’s Web site to make sure every device has the most up to date patch available.
It’s a lot of new work, I know. Patching your wireless drivers probably isn’t your number one security priority, but don’t let it slip off the radar. Git 'er done!
Read more about networking in InfoWorld's Networking Channel.