CVE-2014-3686
16.10.2014, 00:55
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.Enginsight
Vendor | Product | Version |
---|---|---|
w1.fi | hostapd | 0.7.2 |
w1.fi | hostapd | 1.0 |
w1.fi | hostapd | 1.1 |
w1.fi | hostapd | 2.0 |
w1.fi | hostapd | 2.1 |
w1.fi | hostapd | 2.2 |
w1.fi | wpa_supplicant | 0.72 |
w1.fi | wpa_supplicant | 1.0 |
w1.fi | wpa_supplicant | 1.1 |
w1.fi | wpa_supplicant | 2.0 |
w1.fi | wpa_supplicant | 2.1 |
w1.fi | wpa_supplicant | 2.2 |
canonical | ubuntu_linux | 10.04 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
debian | debian_linux | 6.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
hostapd |
| ||||||||||||||||||
wpa |
| ||||||||||||||||||
wpasupplicant |
|
Common Weakness Enumeration
References