Lucene search

K
debianDebianDEBIAN:DLA-260-1:65C9B
HistoryJun 30, 2015 - 6:31 a.m.

[SECURITY] [DLA 260-1] hostapd security update

2015-06-3006:31:53
lists.debian.org
11

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.075 Low

EPSS

Percentile

94.0%

Package : hostapd
Version : 1:0.6.10-2+squeeze2
CVE ID : CVE-2015-4142

A vulnerability was found in WMM Action frame processing in a case where
hostapd is used to implement AP mode MLME/SME functionality (i.e., Host AP
driver of a mac80211-based driver on Linux).

This vulnerability can be used to perform denial of service attacks by
an attacker that is within radio range of the AP that uses hostapd for
MLME/SME operations.

For Debian 6 β€œSqueeze”, this vulnerability has been fixed in version
1:0.6.10-2+squeeze2 of hostapd. We recommend that you upgrade your
hostapd package.

RaphaΓ«l Hertzog β—ˆ Debian Developer

Support Debian LTS: http://www.freexian.com/services/debian-lts.html
Learn to master Debian: http://debian-handbook.info/get/
Attachment:
signature.asc
Description: Digital signature

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.075 Low

EPSS

Percentile

94.0%