Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5310

Опубликовано: 06 янв. 2016
Источник: ubuntu
Приоритет: medium
CVSS2: 3.3
CVSS3: 4.3

Описание

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

РелизСтатусПримечание
devel

released

2.4-0ubuntu5
esm-infra-legacy/trusty

released

2.1-0ubuntu1.4
precise

DNE

trusty

released

2.1-0ubuntu1.4
trusty/esm

released

2.1-0ubuntu1.4
upstream

needs-triage

vivid

released

2.1-0ubuntu7.3
vivid/stable-phone-overlay

released

2.1-0ubuntu7.3
vivid/ubuntu-core

released

2.1-0ubuntu7.3
wily

released

2.4-0ubuntu3.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid

DNE

wily

DNE

Показывать по

3.3 Low

CVSS2

4.3 Medium

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
nvd
около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS3: 4.3
debian
около 10 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not prop ...

CVSS3: 4.3
github
больше 3 лет назад

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

fstec
около 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю получить конфиденциальную информацию

3.3 Low

CVSS2

4.3 Medium

CVSS3