CVE-2014-3686

CVE Details

Release Date:2014-10-10
Impact:Moderate What is this?

Description


A command injection flaw was found in the way the wpa_cli utility executed action scripts. If wpa_cli was run in daemon mode to execute an action script (specified using the -a command line option), and wpa_supplicant was configured to connect to a P2P group, malicious P2P group parameters could cause wpa_cli to execute arbitrary code.

See more information about CVE-2014-3686 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v2 metrics

Base Score: 5.4
Vector String: AV:A/AC:M/Au:N/C:P/I:P/A:P
Version: 2.0
Attack Vector: Adjacent Network
Attack Complexity: Medium
Authentication: None
Confidentiality Impact: Partial
Integrity Impact: Partial
Availability Impact: Partial

Errata information


PlatformErrataRelease Date
Oracle Linux version 7 (wpa_supplicant)ELSA-2014-19562014-12-03


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete