Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-3686

Опубликовано: 16 окт. 2014
Источник: debian
EPSS Низкий

Описание

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpasupplicantremovedpackage
hostapdremovedpackage
hostapdnot-affectedsqueezepackage
wpafixed2.3-1package

EPSS

Процентиль: 89%
0.04511
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

redhat
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

nvd
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

github
больше 3 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

oracle-oval
больше 10 лет назад

ELSA-2014-1956: wpa_supplicant security update (MODERATE)

EPSS

Процентиль: 89%
0.04511
Низкий