fkie_cve-2014-3686
Vulnerability from fkie_nvd
Published
2014-10-16 00:55
Modified
2025-04-12 10:46
Severity ?
Summary
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
w1.fi | hostapd | 0.7.2 | |
w1.fi | hostapd | 1.0 | |
w1.fi | hostapd | 1.1 | |
w1.fi | hostapd | 2.0 | |
w1.fi | hostapd | 2.1 | |
w1.fi | hostapd | 2.2 | |
w1.fi | wpa_supplicant | 0.72 | |
w1.fi | wpa_supplicant | 1.0 | |
w1.fi | wpa_supplicant | 1.1 | |
w1.fi | wpa_supplicant | 2.0 | |
w1.fi | wpa_supplicant | 2.1 | |
w1.fi | wpa_supplicant | 2.2 | |
canonical | ubuntu_linux | 10.04 | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
debian | debian_linux | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "5C5CBC86-4F65-4A1E-8423-D599B8F89EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "768D16AF-3A8B-47DD-A499-948A73062AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3BECC3EF-2777-4FF9-9750-93D1245A9247", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2D07095-6331-4079-BD86-E414CEE35624", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "61CDB3D2-F6C3-43CF-ACE8-95E96DF02293", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "6CCD4904-08CA-45C7-A3D0-90BE5C88CDBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "050B5B2C-38A3-49AA-8487-8BE5C13D3250", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F3EF53AD-F985-446E-89B8-4BFECE00AD63", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A11DBFA-9F0E-4358-8541-E5371C11FE80", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "738AEB08-FF7D-4DC3-AB14-B8F2B9474810", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1E8C5523-16E4-417E-A159-F5D0F9E83C5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "8AE48919-35E0-4C9A-BAEB-A6402FA7BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame." }, { "lang": "es", "value": "wpa_supplicant y hostapd 0.7.2 hasta 2.2 cuando se ejecutan ciertas configuraciones y se utilizan los secuencias de comandos using_wpa_cli o hostapd_cli, permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un frame manipulado." } ], "id": "CVE-2014-3686", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-10-16T00:55:05.577", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2014-0429.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00027.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00028.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2014-1956.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60366" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/60428" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/61271" }, { "source": "secalert@redhat.com", "url": "http://w1.fi/security/2014-1/" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-3052" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:120" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2014/10/09/28" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/70396" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2383-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151259" }, { "source": "secalert@redhat.com", "url": "https://security.gentoo.org/glsa/201606-17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2014-0429.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2014-1956.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/60428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/61271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://w1.fi/security/2014-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-3052" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2014/10/09/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2383-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1151259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/201606-17" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…