CVE-2021-0326

Published on: 02/10/2021 12:00:00 AM UTC

Last Modified on: 04/23/2021 12:15:00 AM UTC

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Debian Linux from Debian contain the following vulnerability:

In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525

  • CVE-2021-0326 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
ADJACENT_NETWORK HIGH NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.9 - HIGH

Access
Vector
Access
Complexity
Authentication
ADJACENT_NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
[SECURITY] [DLA 2572-1] wpa security update Mailing List
Third Party Advisory
lists.debian.org
text/html
URL Logo MLIST [debian-lts-announce] 20210220 [SECURITY] [DLA 2572-1] wpa security update
[SECURITY] Fedora 32 Update: wpa_supplicant-2.9-5.fc32 - package-announce - Fedora Mailing-Lists Mailing List
Third Party Advisory
lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2021-1a2443baa0
[SECURITY] Fedora 34 Update: wpa_supplicant-2.9-11.fc34 - package-announce - Fedora Mailing-Lists lists.fedoraproject.org
text/html
URL Logo FEDORA FEDORA-2021-defe51d282
Android Security Bulletin—February 2021  |  Android Open Source Project Patch
Vendor Advisory
source.android.com
text/html
URL Logo MISC source.android.com/security/bulletin/2021-02-01
Debian -- Security Information -- DSA-4898-1 wpa www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-4898

Related QID Numbers

  • 159205 Oracle Enterprise Linux Security Update for wpa_supplicant (ELSA-2021-1686)
  • 178562 Debian Security Update for wpa (DSA 4898-1)
  • 239318 Red Hat Update for wpa_supplicant (RHSA-2021:1686)
  • 281596 Fedora Security Update for wpa_supplicant (FEDORA-2021-defe51d282)
  • 352380 Amazon Linux Security Advisory for wpa_supplicant: ALAS2-2021-1648
  • 610317 Google Android Devices February 2021 Security Patch Missing
  • 610318 Google Android February 2021 Security Patch Missing for Huawei EMUI
  • 610319 Google Android February 2021 Security Patch Missing for LGE
  • 610320 Google Android February 2021 Security Patch Missing for Samsung
  • 670332 EulerOS Security Update for wpa_supplicant (EulerOS-SA-2021-1892)
  • 750360 OpenSUSE Security Update for wpa_supplicant (openSUSE-SU-2021:0284-1)

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
DebianDebian Linux9.0AllAllAll
Operating
System
DebianDebian Linux9.0AllAllAll
Operating
System
FedoraprojectFedora32AllAllAll
Operating
System
FedoraprojectFedora34AllAllAll
Operating
System
FedoraprojectFedora32AllAllAll
Operating
System
GoogleAndroid10.0AllAllAll
Operating
System
GoogleAndroid11.0AllAllAll
Operating
System
GoogleAndroid8.1AllAllAll
Operating
System
GoogleAndroid9.0AllAllAll
Operating
System
GoogleAndroid10.0AllAllAll
Operating
System
GoogleAndroid11.0AllAllAll
Operating
System
GoogleAndroid8.1AllAllAll
Operating
System
GoogleAndroid9.0AllAllAll
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*:
  • cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*:
© CVE.report 2021 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report