[manjaro-security] [ASA-202012-16] hostapd: proxy injection
foxboron at archlinux.org
Thu Dec 17 20:23:22 CET 2020
Arch Linux Security Advisory ASA-202012-16
Date : 2020-12-09
CVE-ID : CVE-2020-12695
Package : hostapd
Type : proxy injection
Remote : Yes
Link : https://security.archlinux.org/AVG-1322
The package hostapd before version 2.9-4 is vulnerable to proxy
Upgrade to 2.9-4.
# pacman -Syu "hostapd>=2.9-4"
The problem has been fixed upstream but no release is available yet.
The Open Connectivity Foundation UPnP specification before 2020-04-17
does not forbid the acceptance of a subscription request with a
delivery URL on a different network segment than the fully qualified
event-subscription URL, aka the CallStranger issue. This issue could
allow a device connected to the local network (i.e., a device that has
been authorized to transmit packets in the network in which the AP is
located) to trigger the AP to initiate a HTTP (TCP/IP) connection to an
arbitrary URL, including connections to servers in external networks.
An attacker on the local network might be able to force the AP to
initiate a HTTP (TCP/IP) connection to an arbitrary URL, including
connections to servers in external networks.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: not available
More information about the manjaro-security