{"id":"USN-3745-1","summary":"wpa vulnerability","details":"It was discovered that wpa_supplicant and hostapd incorrectly handled certain\nmessages. An attacker could possibly use this to access sensitive information.\n","modified":"2026-02-10T04:41:23Z","published":"2018-08-20T12:57:25Z","related":["UBUNTU-CVE-2018-14526"],"upstream":["CVE-2018-14526","UBUNTU-CVE-2018-14526"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3745-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14526"}],"affected":[{"package":{"name":"wpa","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/wpa@2.1-0ubuntu1.6?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1-0ubuntu1.6"}]}],"versions":["1.0-3ubuntu2","1.0-3ubuntu3","1.0-3ubuntu4","2.1-0ubuntu1","2.1-0ubuntu1.1","2.1-0ubuntu1.2","2.1-0ubuntu1.3","2.1-0ubuntu1.4","2.1-0ubuntu1.5"],"ecosystem_specific":{"binaries":[{"binary_name":"hostapd","binary_version":"1:2.1-0ubuntu1.6"},{"binary_name":"wpagui","binary_version":"2.1-0ubuntu1.6"},{"binary_name":"wpasupplicant","binary_version":"2.1-0ubuntu1.6"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14526"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3745-1.json"}},{"package":{"name":"wpa","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/wpa@2.4-0ubuntu6.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4-0ubuntu6.3"}]}],"versions":["2.4-0ubuntu3","2.4-0ubuntu4","2.4-0ubuntu5","2.4-0ubuntu6","2.4-0ubuntu6.2"],"ecosystem_specific":{"binaries":[{"binary_name":"hostapd","binary_version":"1:2.4-0ubuntu6.3"},{"binary_name":"wpagui","binary_version":"2.4-0ubuntu6.3"},{"binary_name":"wpasupplicant","binary_version":"2.4-0ubuntu6.3"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14526"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3745-1.json"}},{"package":{"name":"wpa","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/wpa@2:2.6-15ubuntu2.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.6-15ubuntu2.1"}]}],"versions":["2.4-0ubuntu10","2:2.4-1.1ubuntu1","2:2.6-15ubuntu1","2:2.6-15ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_name":"hostapd","binary_version":"2:2.6-15ubuntu2.1"},{"binary_name":"wpagui","binary_version":"2:2.6-15ubuntu2.1"},{"binary_name":"wpasupplicant","binary_version":"2:2.6-15ubuntu2.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14526"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3745-1.json"}}],"schema_version":"1.7.3"}