CVE-2021-27803
Published: August 31, 2023Last modified: August 31, 2023
Description
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack Vector | ADJACENT_NETWORK |
Attack complexity | HIGH |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | HIGH |
Integrity impact | HIGH |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | wpa_supplicant | Not affected (2.10-r4) |
Stream | wpa_supplicant | Not affected (2.10-r7) |
References
- http://www.openwall.com/lists/oss-security/2021/02/27/1
- https://lists.debian.org/debian-lts-announce/2021/03/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZGUR5XFHATVXTRAEJMODS7ROYHA56NX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KOGP2VIVVXXQ6CZ2HU4DKGPDB4WR24XF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SEHS2CFGH3KCSNPHBHNGN5SGV6QPMLZ4/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/IZGUR5XFHATVXTRAEJMODS7ROYHA56NX/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/KOGP2VIVVXXQ6CZ2HU4DKGPDB4WR24XF/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/SEHS2CFGH3KCSNPHBHNGN5SGV6QPMLZ4/
- https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
- https://w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processing-vulnerability.txt
- https://www.debian.org/security/2021/dsa-4898
- https://www.openwall.com/lists/oss-security/2021/02/25/3