Описание
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
A command injection flaw was found in the way the wpa_cli utility executed action scripts. If wpa_cli was run in daemon mode to execute an action script (specified using the -a command line option), and wpa_supplicant was configured to connect to a P2P group, malicious P2P group parameters could cause wpa_cli to execute arbitrary code.
Отчет
This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5 and 6.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | wpa_supplicant | Not affected | ||
Red Hat Enterprise Linux 6 | wpa_supplicant | Not affected | ||
Red Hat Enterprise Linux 7 | wpa_supplicant | Fixed | RHSA-2014:1956 | 03.12.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
5.4 Medium
CVSS2
Связанные уязвимости
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certai ...
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
ELSA-2014-1956: wpa_supplicant security update (MODERATE)
EPSS
5.4 Medium
CVSS2