Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3686

Опубликовано: 16 окт. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

released

2.1-0ubuntu4
esm-infra-legacy/trusty

not-affected

2.1-0ubuntu1.1
esm-infra/xenial

not-affected

2.1-0ubuntu4
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

released

2.1-0ubuntu1.1
trusty/esm

not-affected

2.1-0ubuntu1.1
upstream

needs-triage

utopic

released

2.1-0ubuntu4

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

released

0.6.9-3ubuntu3.2
precise

released

0.7.3-6ubuntu2.3
precise/esm

not-affected

0.7.3-6ubuntu2.3
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 89%
0.04511
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

nvd
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

debian
почти 11 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certai ...

github
больше 3 лет назад

wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.

oracle-oval
больше 10 лет назад

ELSA-2014-1956: wpa_supplicant security update (MODERATE)

EPSS

Процентиль: 89%
0.04511
Низкий

6.8 Medium

CVSS2