The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3397-1 | wpa security update |
EUVD |
EUVD-2015-5282 | The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response. |
Ubuntu USN |
USN-2808-1 | wpa_supplicant and hostapd vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T06:41:09.281Z
Reserved: 2015-07-01T00:00:00
Link: CVE-2015-5310
No data.
Status : Deferred
Published: 2016-01-06T19:59:00.110
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-5310
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN