Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 524930 - <net-wireless/hostapd-2.3: action script execution vulnerability (CVE-2014-3686)
Summary: <net-wireless/hostapd-2.3: action script execution vulnerability (CVE-2014-3686)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-10-10 08:50 UTC by Agostino Sarubbo
Modified: 2016-11-21 10:01 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-10-10 08:50:34 UTC
From ${URL} :

Published: October 9, 2014
Identifier: CVE-2014-3686
Latest version available from: http://w1.fi/security/2014-1/


Vulnerability

A vulnerability was found in the mechanism wpa_cli and hostapd_cli use
for executing action scripts. An unsanitized string received from a
remote device can be passed to a system() call resulting in arbitrary
command execution under the privileges of the wpa_cli/hostapd_cli
process (which may be root or at least network admin in common use
cases).


Vulnerable versions/configurations

wpa_cli is a component distributed with wpa_supplicant and hostapd_cli
is a component distributed with hostapd. The vulnerability affects only
cases where wpa_cli or hostapd_cli is used to run action scripts (-a
command line option) and one (or more) of the following build
combinations for wpa_supplicant/hostapd is used:

wpa_supplicant v1.0-v2.2 with CONFIG_P2P build option enabled and
connecting to a P2P group

wpa_supplicant v2.1-v2.2 with CONFIG_WNM build option enabled

wpa_supplicant v2.2 with CONFIG_HS20 build option enabled

wpa_supplicant v0.7.2-v2.2 with CONFIG_WPS build option enabled and
operating as WPS Registrar

hostapd v0.7.2-v2.2 with CONFIG_WPS build option enabled and WPS enabled
in runtime configuration

wpa_supplicant and hostapd processes are not directly affected, i.e.,
the vulnerability occurs in the wpa_cli/hostapd process based on
information received from wpa_supplicant/hostapd.

Attacker (or a system controlled by the attacker) needs to be within
radio range of the vulnerable system to send a frame that triggers a
suitable formatted event message to allow full control on command
execution.


Possible mitigation steps

- Update to wpa_cli/hostapd_cli from wpa_supplicant/hostapd v2.3

- Merge the following commits to an older version of wpa_cli/hostapd_cli
  and rebuild it:

  Add os_exec() helper to run external programs
  wpa_cli: Use os_exec() for action script execution
  hostapd_cli: Use more robust mechanism for action script execution

  These patches are available from http://w1.fi/security/2014-1/

- Disable use of wpa_cli/hostapd_cli command to run action scripts
  (this may prevent functionality)


@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Bjarke Istrup Pedersen (RETIRED) gentoo-dev 2014-10-10 18:58:37 UTC
This is fixed in 2.3 - I have bumped hostapd to this version.

It needs to be stabilized on these archs before we can remove the old versions: amd64, ppc, x86
Comment 2 Yury German Gentoo Infrastructure gentoo-dev 2014-10-15 03:54:56 UTC
(In reply to Bjarke Istrup Pedersen from comment #1)
> This is fixed in 2.3 - I have bumped hostapd to this version.
> 
> It needs to be stabilized on these archs before we can remove the old
> versions: amd64, ppc, x86

Are you ready for stabilization, or more testing is needed?
Comment 3 Bjarke Istrup Pedersen (RETIRED) gentoo-dev 2014-10-15 07:22:17 UTC
Lets go for stable - being able to remove the older versions would clean up a few things for both hostapd and wpa_supplicant.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2015-01-04 02:04:14 UTC
CVE-2014-3686 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3686):
  wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain
  configurations and using wpa_cli or hostapd_cli with action scripts, allows
  remote attackers to execute arbitrary commands via a crafted frame.
Comment 5 Aaron Bauman (RETIRED) gentoo-dev 2016-03-13 11:26:10 UTC
Added to existing GLSA.
Comment 6 Aaron Bauman (RETIRED) gentoo-dev 2016-11-21 10:01:06 UTC
Bug was to be added to an existing GLSA containing higher severity vulnerabilities, but I did not add it apparently.  Closing independently of that.  Tree is clean.