[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-4145Date: (C)2015-06-15   (M)2023-12-22


The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
DSA-3397
GLSA-201606-17
USN-2650-1
http://www.openwall.com/lists/oss-security/2015/05/09/6
http://www.openwall.com/lists/oss-security/2015/05/31/6
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt
openSUSE-SU-2015:1030

CPE    11
cpe:/o:opensuse:opensuse:13.1
cpe:/a:w1.fi:wpa_supplicant:2.2
cpe:/a:w1.fi:wpa_supplicant:2.1
cpe:/a:w1.fi:wpa_supplicant:1.1
...
CWE    1
CWE-399
OVAL    3
oval:org.secpod.oval:def:52506
oval:org.secpod.oval:def:602277
oval:org.secpod.oval:def:702612

© SecPod Technologies