Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3686

Опубликовано: 10 окт. 2014
Источник: redhat
CVSS2: 5.4
EPSS Низкий

Описание

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

A command injection flaw was found in the way the wpa_cli utility executed action scripts. If wpa_cli was run in daemon mode to execute an action script (specified using the -a command line option), and wpa_supplicant was configured to connect to a P2P group, malicious P2P group parameters could cause wpa_cli to execute arbitrary code.

Отчет

This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5 and 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantNot affected
Red Hat Enterprise Linux 6wpa_supplicantNot affected
Red Hat Enterprise Linux 7wpa_supplicantFixedRHSA-2014:195603.12.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1151259hostapd: wpa_cli and hostapd_cli remote command execution issue

EPSS

Процентиль: 89%
0.04511
Низкий

5.4 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

nvd
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

debian
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certai ...

github
больше 3 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

oracle-oval
больше 10 лет назад

ELSA-2014-1956: wpa_supplicant security update (MODERATE)

EPSS

Процентиль: 89%
0.04511
Низкий

5.4 Medium

CVSS2