Advisories ยป MGASA-2014-0429

Updated wpa_supplicant and hostapd packages fix security vulnerability

Publication date: 28 Oct 2014
Modification date: 28 Oct 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-3686

Description

A vulnerability was found in the mechanism wpa_cli and hostapd_cli use
for executing action scripts. An unsanitized string received from a
remote device can be passed to a system() call resulting in arbitrary
command execution under the privileges of the wpa_cli/hostapd_cli
process (which may be root in common use cases) (CVE-2014-3686).

Using the Mageia wpa_supplicant package, systems are exposed to the
vulnerability if operating as a WPS registrar.

The Mageia hostapd package was not vulnerable with the configuration with
which it was built, but if a sysadmin had rebuilt it with WPS enabled, it
would be vulnerable.
                

References

SRPMS

3/core

4/core