[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:52506
wpa: client support for WPA and WPA2 - wpasupplicant: client support for WPA and WPA2 wpa_supplicant and hostapd could be made to crash if they received specially crafted network traffic.

oval:org.secpod.oval:def:602277
Several vulnerabilities have been discovered in wpa_supplicant and hostapd. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-4141 Kostya Kortchinsky of the Google Security Team discovered a vulnerability in the WPS UPnP function with HTTP chunked transfer ...

oval:org.secpod.oval:def:89045408
wpa_supplicant was updated to fix two security issues. These security issues were fixed: - CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd and wpa_supplicant, when used for AP mode MLME/SME functionality, allowed remote attackers to cause a denial of service via a crafted ...

oval:org.secpod.oval:def:702612
wpa: client support for WPA and WPA2 - wpasupplicant: client support for WPA and WPA2 wpa_supplicant and hostapd could be made to crash if they received specially crafted network traffic.

oval:org.secpod.oval:def:89000086
This update for wpa_supplicant fixes the following issues: Security issue fixed: - CVE-2019-16275: Fixed an AP mode PMF disconnection protection bypass . Non-security issues fixed: - Enable SAE support . - Limit P2P_DEVICE name to appropriate ifname size. - Fix wicked wlan - Restore fi.epitest.host ...

CPE    19
cpe:/o:opensuse:opensuse:13.1
cpe:/a:w1.fi:hostapd:0.7.3
cpe:/a:w1.fi:wpa_supplicant:2.2
cpe:/a:w1.fi:hostapd:0.7.2
...
CWE    1
CWE-119
*CVE
CVE-2015-4141

© SecPod Technologies