CVE-2015-5310

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast or multicast packets or cause a denial of service (ignored packets) via a WNM Sleep Mode response.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:32

Type Values Removed Values Added
References () http://source.android.com/security/bulletin/2016-01-01.html - Vendor Advisory () http://source.android.com/security/bulletin/2016-01-01.html - Vendor Advisory
References () http://w1.fi/security/2015-6/wpa_supplicant-unauthorized-wnm-sleep-mode-gtk-control.txt - () http://w1.fi/security/2015-6/wpa_supplicant-unauthorized-wnm-sleep-mode-gtk-control.txt -
References () http://www.debian.org/security/2015/dsa-3397 - () http://www.debian.org/security/2015/dsa-3397 -
References () http://www.openwall.com/lists/oss-security/2015/11/10/9 - () http://www.openwall.com/lists/oss-security/2015/11/10/9 -
References () http://www.securityfocus.com/bid/77541 - () http://www.securityfocus.com/bid/77541 -
References () http://www.securitytracker.com/id/1034592 - () http://www.securitytracker.com/id/1034592 -
References () http://www.ubuntu.com/usn/USN-2808-1 - () http://www.ubuntu.com/usn/USN-2808-1 -

Information

Published : 2016-01-06 19:59

Updated : 2024-11-21 02:32


NVD link : CVE-2015-5310

Mitre link : CVE-2015-5310

CVE.ORG link : CVE-2015-5310


JSON object : View

Products Affected

google

  • android
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor