5.8 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:P/I:P/A:P
Vulnerabilities in wpa_supplicant may affect PowerKVM (CVE-2015-1863 and CVE-2015-4142). These vulnerability are now fixed. Note that although the code exists in PowerKVM, the functionality is not enabled or supported as shipped.
CVEID: CVE-2015-1863**
DESCRIPTION:** wpa_supplicant is vulnerable to a buffer overflow, caused by improper bounds checking of SSID information from management frames. By sending a malicious management frame, a remote attacker from within Wi-Fi radio range could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base Score: 5.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/102587 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:A/AC:L/Au:N/C:P/I:P/A:P)
CVEID: CVE-2015-4142**
DESCRIPTION:** W1.fi hostapd and wpa_supplicant are vulnerable to an integer underflow, caused by a failure to properly verify specific bytes by the WMM Action frame parser in AP mode. By sending specially crafted frames to a victim, a remote attacker can exploit this vulnerability to force a buffer read overflow and cause a denial of service condition.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/105113 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:N/A:P)
PowerKVM 2.1
Fix is made available via Fix Central (https://ibm.biz/BdEnT8) in 2.1.1 Build 65.1 and all later 2.1.1 SP3 service builds and 2.1.1 fix packs. For systems currently running fix levels of PowerKVM prior to 2.1.1, please see <http://download4.boulder.ibm.com/sar/CMA/OSA/05e4c/0/README> for prerequisite fixes and instructions. Customers can also update from 2.1.1 (GA and later levels) by using βyum updateβ
none