Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5310

Опубликовано: 10 нояб. 2015
Источник: redhat
CVSS2: 2.9
EPSS Низкий

Описание

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

Отчет

Not vulnerable. This issue did not affect the versions of wpa_supplicant as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they do not include the WNM functionality.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantNot affected
Red Hat Enterprise Linux 6wpa_supplicantNot affected
Red Hat Enterprise Linux 7wpa_supplicantNot affected

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1277857wpa_supplicant: unauthorized WNM Sleep Mode GTK control

EPSS

Процентиль: 53%
0.00304
Низкий

2.9 Low

CVSS2

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
nvd
около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
debian
около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not prop ...

CVSS3: 4.3
github
больше 3 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

fstec
около 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию

EPSS

Процентиль: 53%
0.00304
Низкий

2.9 Low

CVSS2