CVE-2014-3686
Published: 9 October 2014
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
Priority
Status
Package | Release | Status |
---|---|---|
hostapd Launchpad, Ubuntu, Debian |
lucid |
Ignored
(reached end-of-life)
|
precise |
Does not exist
(precise was needed)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: http://w1.fi/security/2014-1/ |
||
wpa Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
trusty |
Released
(2.1-0ubuntu1.1)
|
|
upstream |
Needs triage
|
|
utopic |
Released
(2.1-0ubuntu4)
|
|
vivid |
Released
(2.1-0ubuntu4)
|
|
wily |
Released
(2.1-0ubuntu4)
|
|
xenial |
Released
(2.1-0ubuntu4)
|
|
yakkety |
Released
(2.1-0ubuntu4)
|
|
zesty |
Released
(2.1-0ubuntu4)
|
|
wpasupplicant Launchpad, Ubuntu, Debian |
lucid |
Released
(0.6.9-3ubuntu3.2)
|
precise |
Released
(0.7.3-6ubuntu2.3)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
xenial |
Does not exist
|
|
yakkety |
Does not exist
|
|
zesty |
Does not exist
|
|
Patches: upstream: http://w1.fi/security/2014-1/ |