CVE-2014-3686
Published Oct 16, 2014
Last updated 8 years ago
Overview
- Description
- wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C5CBC86-4F65-4A1E-8423-D599B8F89EE6" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "768D16AF-3A8B-47DD-A499-948A73062AE1" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BECC3EF-2777-4FF9-9750-93D1245A9247" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2D07095-6331-4079-BD86-E414CEE35624" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61CDB3D2-F6C3-43CF-ACE8-95E96DF02293" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CCD4904-08CA-45C7-A3D0-90BE5C88CDBF" }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:0.72:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "050B5B2C-38A3-49AA-8487-8BE5C13D3250" }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3EF53AD-F985-446E-89B8-4BFECE00AD63" }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A11DBFA-9F0E-4358-8541-E5371C11FE80" }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "738AEB08-FF7D-4DC3-AB14-B8F2B9474810" }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E8C5523-16E4-417E-A159-F5D0F9E83C5B" }, { "criteria": "cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AE48919-35E0-4C9A-BAEB-A6402FA7BD4E" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084" }, { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244" } ], "operator": "OR" } ] } ]