FreeBSD : hostapd and wpa_supplicant -- multiple vulnerabilities (976567f6-05c5-11e6-94fa-002590263bf5)

medium Nessus Plugin ID 90568

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Jouni Malinen reports :

wpa_supplicant unauthorized WNM Sleep Mode GTK control. (2015-6 - CVE-2015-5310)

EAP-pwd missing last fragment length validation. (2015-7 - CVE-2015-5315)

EAP-pwd peer error path failure on unexpected Confirm message. (2015-8
- CVE-2015-5316)

Solution

Update the affected packages.

See Also

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=208482

http://www.nessus.org/u?3ad08268

http://www.nessus.org/u?dc4804ad

http://w1.fi/security/2015-8/eap-pwd-unexpected-confirm.txt

http://www.nessus.org/u?67342077

Plugin Details

Severity: Medium

ID: 90568

File Name: freebsd_pkg_976567f605c511e694fa002590263bf5.nasl

Version: 2.7

Type: local

Published: 4/19/2016

Updated: 1/4/2021

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:hostapd, p-cpe:/a:freebsd:freebsd:wpa_supplicant, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/19/2016

Vulnerability Publication Date: 11/10/2015

Reference Information

CVE: CVE-2015-5310, CVE-2015-5315, CVE-2015-5316