Total vulnerabilities in the database
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
Software | From | Fixed in |
---|---|---|
w1.fi / hostapd | 1.1 | 1.1.x |
w1.fi / hostapd | 2.0 | 2.0.x |
w1.fi / wpa_supplicant | 2.1 | 2.1.x |
w1.fi / wpa_supplicant | 2.2 | 2.2.x |
w1.fi / hostapd | 1.0 | 1.0.x |
w1.fi / wpa_supplicant | 1.0 | 1.0.x |
w1.fi / wpa_supplicant | 1.1 | 1.1.x |
debian / debian_linux | 6.0 | 6.0.x |
w1.fi / hostapd | 0.7.2 | 0.7.2.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
w1.fi / wpa_supplicant | 0.72 | 0.72.x |
w1.fi / hostapd | 2.2 | 2.2.x |
canonical / ubuntu_linux | 10.04 | 10.04.x |
w1.fi / hostapd | 2.1 | 2.1.x |
w1.fi / wpa_supplicant | 2.0 | 2.0.x |