A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/02/27/1 - Mailing List, Mitigation, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/03/msg00003.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZGUR5XFHATVXTRAEJMODS7ROYHA56NX/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KOGP2VIVVXXQ6CZ2HU4DKGPDB4WR24XF/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SEHS2CFGH3KCSNPHBHNGN5SGV6QPMLZ4/ - | |
References | () https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch - Patch, Vendor Advisory | |
References | () https://w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processing-vulnerability.txt - Mitigation, Vendor Advisory | |
References | () https://www.debian.org/security/2021/dsa-4898 - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2021/02/25/3 - Mailing List, Mitigation, Third Party Advisory |
07 Nov 2023, 03:32
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-02-26 23:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27803
Mitre link : CVE-2021-27803
CVE.ORG link : CVE-2021-27803
JSON object : View
Products Affected
w1.fi
- wpa_supplicant
debian
- debian_linux
fedoraproject
- fedora
CWE