Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
ArubaOS Multiple Vulnerabilities (ARUBA-PSA-2016-007)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
ArubaOS is prone to multiple vulnerabilities A buffer over-read vulnerability allows an unauthenticated user to read from uninitialized memory locations. Based on analysis of the flaw, Aruba does not believe that this memory is likely to contain sensitive information. The Broadcom Wi-Fi driver used in the AP-2xx series access points allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets. The attacker must be joined to the network (wired or wireless) - this vulnerability may not be exercised by an unauthenticated user against a WPA2 network. A flaw in the ISC DHCP server allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet. The flawed DHCP server is incorporated into ArubaOS. If the DHCP server is enabled in an Aruba mobility controller, an attacker could cause it to crash. ArubaOS would automatically restart the process. However, DHCP services would be disrupted temporarily.
Affected Software
Affected Software
-- ArubaOS 6.3 prior to 6.3.1.21 - - ArubaOS 6.4.2.x prior to 6.4.2.16 - - ArubaOS 6.4.3.x prior to 6.4.3.7 - - ArubaOS 6.4.4.x prior to 6.4.4.5
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to one of the following software versions: - - ArubaOS 6.3.1.21 or later - - ArubaOS 6.4.2.16 or later - - ArubaOS 6.4.3.7 or later - - ArubaOS 6.4.4.5 or later