Lucene search

K
osvGoogleOSV:DLA-260-1
HistoryJun 30, 2015 - 12:00 a.m.

hostapd - security update

2015-06-3000:00:00
Google
osv.dev
7

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

A vulnerability was found in WMM Action frame processing in a case where
hostapd is used to implement AP mode MLME/SME functionality (i.e., Host AP
driver of a mac80211-based driver on Linux).

This vulnerability can be used to perform denial of service attacks by
an attacker that is within radio range of the AP that uses hostapd for
MLME/SME operations.

For Debian 6 Squeeze, this vulnerability has been fixed in version
1:0.6.10-2+squeeze2 of hostapd. We recommend that you upgrade your
hostapd package.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P