Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3686

Опубликовано: 16 окт. 2014
Источник: debian

Описание

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpasupplicantremovedpackage
hostapdremovedpackage
hostapdnot-affectedsqueezepackage
wpafixed2.3-1package

Связанные уязвимости

ubuntu
около 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

redhat
около 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

nvd
около 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

github
больше 3 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

oracle-oval
почти 11 лет назад

ELSA-2014-1956: wpa_supplicant security update (MODERATE)