First published: Fri Oct 10 2014(Updated: )
Jouni Malinen discovered that a string supplied from a remote device could be supplied to a system() call in wpa_cli or hostapd_cli when running an action script (with the "-a" option), resulting in arbitrary command execution. This issue could also be triggered by an attacker within radio range. Patches are available from the following: <a href="http://w1.fi/security/2014-1/">http://w1.fi/security/2014-1/</a> Based on the information about affected configurations in the upstream advisory, Red Hat Enterprise Linux 5 is likely to be not vulnerable, but Red Hat Enterprise Linux 6 and 7 are likely to be vulnerable. Acknowledgements: Red Hat would like to thank Jouni Malinen for reporting this issue. References: <a href="http://w1.fi/security/2014-1/">http://w1.fi/security/2014-1/</a> <a href="http://www.openwall.com/lists/oss-security/2014/10/09/28">http://www.openwall.com/lists/oss-security/2014/10/09/28</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/wpa_supplicant | <2.3 | 2.3 |
redhat/hostapd | <2.3 | 2.3 |
hostapd | =0.7.2 | |
hostapd | =1.0 | |
hostapd | =1.1 | |
hostapd | =2.0 | |
hostapd | =2.1 | |
hostapd | =2.2 | |
wpa_supplicant | =0.72 | |
wpa_supplicant | =1.0 | |
wpa_supplicant | =1.1 | |
wpa_supplicant | =2.0 | |
wpa_supplicant | =2.1 | |
wpa_supplicant | =2.2 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Debian | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3686 has a severity level that indicates it allows for arbitrary command execution due to improper handling of string input.
To fix CVE-2014-3686, upgrade to wpa_supplicant version 2.3 or hostapd version 2.3, or the respective patched versions for affected software.
CVE-2014-3686 affects versions of wpa_supplicant up to 2.3 and hostapd up to 2.3 from Red Hat, as well as several versions of both from w1.fi and Debian.
Yes, CVE-2014-3686 can be exploited by an attacker within radio range, leading to potential command execution on vulnerable systems.
The potential consequences of CVE-2014-3686 include unauthorized command execution, which could compromise system integrity and security.