Information Exposure Affecting wpa package, versions <2.3-2.3


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.54% (78th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-WPA-339465
  • published6 Jan 2016
  • disclosed6 Jan 2016

Introduced: 6 Jan 2016

CVE-2015-5310  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Debian:10 wpa to version 2.3-2.3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream wpa package and not the wpa package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.

CVSS Scores

version 3.1