[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-4143Date: (C)2015-06-15   (M)2023-12-22


The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
DSA-3397
GLSA-201606-17
USN-2650-1
http://www.openwall.com/lists/oss-security/2015/05/09/6
http://www.openwall.com/lists/oss-security/2015/05/31/6
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
openSUSE-SU-2015:1030

CPE    11
cpe:/o:opensuse:opensuse:13.1
cpe:/a:w1.fi:wpa_supplicant:2.2
cpe:/a:w1.fi:wpa_supplicant:2.1
cpe:/a:w1.fi:wpa_supplicant:1.1
...
CWE    1
CWE-119
OVAL    4
oval:org.secpod.oval:def:52506
oval:org.secpod.oval:def:602277
oval:org.secpod.oval:def:702612
oval:org.secpod.oval:def:89000086
...

© SecPod Technologies