Release Date: | 2015-04-22 |
A buffer overflow flaw was found in the way wpa_supplicant handled SSID information in the Wi-Fi Direct / P2P management frames. A specially crafted frame could allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash or, possibly, execute arbitrary code.
See more information about CVE-2015-1863 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 6.8 | Base Metrics: | AV:A/AC:H/Au:N/C:C/I:C/A:C |
Access Vector: | Adjacent network | Attack Complexity: | High |
Authentication: | None required | Confidentiality Impact: | Complete |
Integrity Impact: | Complete | Availability Impact: | Complete |
Platform | Errata | Release Date |
Oracle Linux version 7 (wpa_supplicant) | ELSA-2015-1090 | 2015-06-11 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team