Fedora 21 : wpa_supplicant-2.0-13.fc21 (2015-6860)

high Nessus Plugin ID 83094

Synopsis

The remote Fedora host is missing a security update.

Description

This update addresses a security vulnerability identified as CVE-2015-1863 . More information on this vulnerability is provided by upstream at https://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt .
An extract :

Attacker (or a system controlled by the attacker) needs to be within radio range of the vulnerable system to send a suitably constructed management frame that triggers a P2P peer device information to be created or updated.

The vulnerability is easiest to exploit while the device has started an active P2P operation (e.g., has ongoing P2P_FIND or P2P_LISTEN control interface command in progress). However, it may be possible, though significantly more difficult, to trigger this even without any active P2P operation in progress.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected wpa_supplicant package.

See Also

http://www.nessus.org/u?d2832ebb

https://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt

Plugin Details

Severity: High

ID: 83094

File Name: fedora_2015-6860.nasl

Version: 2.4

Type: local

Agent: unix

Published: 4/28/2015

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:wpa_supplicant, cpe:/o:fedoraproject:fedora:21

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 4/26/2015

Reference Information

FEDORA: 2015-6860