Executive Summary

Summary
Title hostapd and wpa_supplicant: Multiple vulnerabilities
Informations
Name GLSA-201606-17 First vendor Publication 2016-06-27
Vendor Gentoo Last vendor Modification 2016-06-27
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

Multiple vulnerabilities have been found in hostapd and wpa_supplicant, allowing remote attackers to execute arbitrary code or cause Denial of Service.

Background

wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE
802.11i / RSN). hostapd is a user space daemon for access point and authentication servers.

Description

Multiple vulnerabilities exist in both hostapd and wpa_supplicant.
Please review the CVE identifiers for more information.

Impact

Remote attackers could execute arbitrary code with the privileges of the process or cause Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All hostapd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.5"

All wpa_supplicant users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=net-wireless/wpa_supplicant-2.5-r1"

References

[ 1 ] CVE-2014-3686
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686
[ 2 ] CVE-2014-3686
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686
[ 3 ] CVE-2015-1863
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1863
[ 4 ] CVE-2015-4141
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4141
[ 5 ] CVE-2015-4142
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4142
[ 6 ] CVE-2015-4143
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4143
[ 7 ] CVE-2015-4144
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4144
[ 8 ] CVE-2015-4145
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4145
[ 9 ] CVE-2015-4146
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4146

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201606-17

Original Source

Url : http://security.gentoo.org/glsa/glsa-201606-17.xml

CWE : Common Weakness Enumeration

% Id Name
71 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
14 % CWE-399 Resource Management Errors
14 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26962
 
Oval ID: oval:org.mitre.oval:def:26962
Title: DSA-3052-1 wpa - security update
Description: Jouni Malinen discovered an input sanitization issue in the wpa_cli and hostapd_cli tools included in the wpa package. A remote wifi system within range could provide a crafted string triggering arbitrary code execution running with privileges of the affected wpa_cli or hostapd_cli process.
Family: unix Class: patch
Reference(s): DSA-3052-1
CVE-2014-3686
Version: 3
Platform(s): Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): wpa
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27129
 
Oval ID: oval:org.mitre.oval:def:27129
Title: USN-2383-1 -- wpa_supplicant vulnerability
Description: Jouni Malinen discovered that the wpa_cli tool incorrectly sanitized strings when being used with action scripts. A remote attacker could possibly use this issue to execute arbitrary commands.
Family: unix Class: patch
Reference(s): USN-2383-1
CVE-2014-3686
Version: 3
Platform(s): Ubuntu 14.04
Ubuntu 12.04
Ubuntu 10.04
Product(s): wpa
wpasupplicant
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27507
 
Oval ID: oval:org.mitre.oval:def:27507
Title: RHSA-2014:1956 -- wpa_supplicant security update (Moderate)
Description: The wpa_supplicant package contains an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. It implements key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver. A command injection flaw was found in the way the wpa_cli utility executed action scripts. If wpa_cli was run in daemon mode to execute an action script (specified using the -a command line option), and wpa_supplicant was configured to connect to a P2P group, malicious P2P group parameters could cause wpa_cli to execute arbitrary code. (CVE-2014-3686) Red Hat would like to thank Jouni Malinen for reporting this issue. All wpa_supplicant users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.
Family: unix Class: patch
Reference(s): RHSA-2014:1956
CESA-2014:1956
CVE-2014-3686
Version: 5
Platform(s): Red Hat Enterprise Linux 7
CentOS Linux 7
Product(s): wpa_supplicant
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28391
 
Oval ID: oval:org.mitre.oval:def:28391
Title: ELSA-2014-1956 -- wpa_supplicant security update (moderate)
Description: [1:2.0-13] - Use os_exec() for action script execution (CVE-2014-3686)
Family: unix Class: patch
Reference(s): ELSA-2014-1956
CVE-2014-3686
Version: 5
Platform(s): Oracle Linux 7
Product(s): wpa_supplicant
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28509
 
Oval ID: oval:org.mitre.oval:def:28509
Title: SUSE-SU-2014:1356-1 -- Security update for wpa_supplicant (important)
Description: This update fixes a remote code execution vulnerability in wpa_supplicant's wpa_cli and hostapd_cli tools. CVE-2014-3686 has been assigned to this issue. Additionally, password based authentication with PKCS#5v2 has been enabled. Security Issues: * CVE-2014-3686 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3686>
Family: unix Class: patch
Reference(s): SUSE-SU-2014:1356-1
CVE-2014-3686
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): wpa_supplicant
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:29095
 
Oval ID: oval:org.mitre.oval:def:29095
Title: SUSE-SU-2015:1013-1 -- Security update for wpa_supplicant (moderate)
Description: wpa_supplicant was updated to fix three security issues: - CVE-2015-0210: wpa_supplicant: broken certificate subject check this adds the "domain_match" config option from upstream (additional to the already existing domain_suffix_match) - CVE-2014-3686: hostapd command execution - CVE-2015-1863: P2P SSID processing vulnerability
Family: unix Class: patch
Reference(s): SUSE-SU-2015:1013-1
CVE-2015-0210
CVE-2014-3686
CVE-2015-1863
Version: 3
Platform(s): SUSE Linux Enterprise Server 12
SUSE Linux Enterprise Desktop 12
Product(s): wpa_supplicant
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11
Application 12
Os 5
Os 3
Os 2
Os 2
Os 2
Os 1
Os 2
Os 1
Os 2

Nessus® Vulnerability Scanner

Date Description
2017-10-30 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2017-1201.nasl - Type : ACT_GATHER_INFO
2016-09-26 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2016-1104.nasl - Type : ACT_GATHER_INFO
2016-09-15 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2016-2305-1.nasl - Type : ACT_GATHER_INFO
2016-06-28 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201606-17.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-cfea96144a.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-6f16b5e39e.nasl - Type : ACT_GATHER_INFO
2016-03-04 Name : The remote Fedora host is missing a security update.
File : fedora_2015-1521e91178.nasl - Type : ACT_GATHER_INFO
2015-12-09 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-2221-1.nasl - Type : ACT_GATHER_INFO
2015-11-11 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3397.nasl - Type : ACT_GATHER_INFO
2015-08-04 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150722_wpa_supplicant_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2015-07-30 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2015-1439.nasl - Type : ACT_GATHER_INFO
2015-07-28 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2015-1439.nasl - Type : ACT_GATHER_INFO
2015-07-23 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1439.nasl - Type : ACT_GATHER_INFO
2015-07-01 Name : The remote Debian host is missing a security update.
File : debian_DLA-260.nasl - Type : ACT_GATHER_INFO
2015-06-17 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-2650-1.nasl - Type : ACT_GATHER_INFO
2015-06-16 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2015-1090.nasl - Type : ACT_GATHER_INFO
2015-06-15 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-411.nasl - Type : ACT_GATHER_INFO
2015-06-12 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20150611_wpa_supplicant_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2015-06-12 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1090.nasl - Type : ACT_GATHER_INFO
2015-06-12 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2015-1090.nasl - Type : ACT_GATHER_INFO
2015-06-10 Name : The remote SUSE host is missing one or more security updates.
File : suse_SU-2015-1013-1.nasl - Type : ACT_GATHER_INFO
2015-06-03 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_bbc0db92084c11e5bb90002590263bf5.nasl - Type : ACT_GATHER_INFO
2015-05-13 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2015-132-03.nasl - Type : ACT_GATHER_INFO
2015-05-13 Name : The remote Fedora host is missing a security update.
File : fedora_2015-6952.nasl - Type : ACT_GATHER_INFO
2015-05-04 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-341.nasl - Type : ACT_GATHER_INFO
2015-04-29 Name : The remote Fedora host is missing a security update.
File : fedora_2015-6898.nasl - Type : ACT_GATHER_INFO
2015-04-28 Name : The remote Fedora host is missing a security update.
File : fedora_2015-6860.nasl - Type : ACT_GATHER_INFO
2015-04-27 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_cb9d2fcdeb4711e4b03e002590263bf5.nasl - Type : ACT_GATHER_INFO
2015-04-27 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3233.nasl - Type : ACT_GATHER_INFO
2015-04-24 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2577-1.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2015-120.nasl - Type : ACT_GATHER_INFO
2015-03-26 Name : The remote Debian host is missing a security update.
File : debian_DLA-147.nasl - Type : ACT_GATHER_INFO
2014-12-15 Name : The remote Slackware host is missing a security update.
File : Slackware_SSA_2014-344-07.nasl - Type : ACT_GATHER_INFO
2014-12-05 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2014-1956.nasl - Type : ACT_GATHER_INFO
2014-12-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1956.nasl - Type : ACT_GATHER_INFO
2014-12-04 Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2014-1956.nasl - Type : ACT_GATHER_INFO
2014-12-04 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20141203_wpa_supplicant_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2014-11-10 Name : The remote Fedora host is missing a security update.
File : fedora_2014-13537.nasl - Type : ACT_GATHER_INFO
2014-11-07 Name : The remote Fedora host is missing a security update.
File : fedora_2014-13783.nasl - Type : ACT_GATHER_INFO
2014-11-07 Name : The remote Fedora host is missing a security update.
File : fedora_2014-13778.nasl - Type : ACT_GATHER_INFO
2014-11-05 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_wpa_supplicant-141015.nasl - Type : ACT_GATHER_INFO
2014-11-03 Name : The remote Fedora host is missing a security update.
File : fedora_2014-13608.nasl - Type : ACT_GATHER_INFO
2014-10-30 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2014-211.nasl - Type : ACT_GATHER_INFO
2014-10-30 Name : The remote Fedora host is missing a security update.
File : fedora_2014-13555.nasl - Type : ACT_GATHER_INFO
2014-10-23 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-600.nasl - Type : ACT_GATHER_INFO
2014-10-23 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2014-599.nasl - Type : ACT_GATHER_INFO
2014-10-17 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3052.nasl - Type : ACT_GATHER_INFO
2014-10-15 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2383-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2016-06-29 13:28:12
  • Multiple Updates
2016-06-27 13:24:03
  • First insertion