FreeBSD : hostapd and wpa_supplicant -- multiple vulnerabilities (976567f6-05c5-11e6-94fa-002590263bf5)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Jouni Malinen reports :

wpa_supplicant unauthorized WNM Sleep Mode GTK control. (2015-6 -
CVE-2015-5310)

EAP-pwd missing last fragment length validation. (2015-7 -
CVE-2015-5315)

EAP-pwd peer error path failure on unexpected Confirm message. (2015-8
- CVE-2015-5316)

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=208482
http://www.nessus.org/u?3ad08268
http://www.nessus.org/u?dc4804ad
http://w1.fi/security/2015-8/eap-pwd-unexpected-confirm.txt
http://www.nessus.org/u?992873a7

Solution :

Update the affected packages.

Risk factor :

Low / CVSS Base Score : 3.3
(CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 90568 ()

Bugtraq ID:

CVE ID: CVE-2015-5310
CVE-2015-5315
CVE-2015-5316

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now