7.5 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.4 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:M/Au:N/C:P/I:P/A:P
wpa_supplicant is vulnerable to arbitrary code execution (RCE). The vulnerability exists in the way p2p/p2p_pd.c
processes P2P (Wi-Fi Direct) provision discovery requests.
www.openwall.com/lists/oss-security/2021/02/27/1
lists.debian.org/debian-lts-announce/2021/03/msg00003.html
lists.fedoraproject.org/archives/list/[email protected]/message/IZGUR5XFHATVXTRAEJMODS7ROYHA56NX/
lists.fedoraproject.org/archives/list/[email protected]/message/KOGP2VIVVXXQ6CZ2HU4DKGPDB4WR24XF/
lists.fedoraproject.org/archives/list/[email protected]/message/SEHS2CFGH3KCSNPHBHNGN5SGV6QPMLZ4/
secdb.alpinelinux.org/v3.10/main.yaml
secdb.alpinelinux.org/v3.11/main.yaml
secdb.alpinelinux.org/v3.12/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processing-vulnerability.txt
www.debian.org/security/2021/dsa-4898
www.openwall.com/lists/oss-security/2021/02/25/3
7.5 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
5.4 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:M/Au:N/C:P/I:P/A:P