[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.10] wpa_supplicant: EAP-pwd message reassembly issue with unexpected fragment (CVE-2019-11555)

ID: oval:org.secpod.oval:def:1801486Date: (C)2019-06-27   (M)2023-11-10
Class: PATCHFamily: unix




The EAP-pwd implementation in hostapd before 2.8 and wpa_supplicant before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference . This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

Platform:
Alpine Linux 3.10
Product:
wpa_supplicant
Reference:
10414
CVE-2019-11555
CVE    1
CVE-2019-11555
CPE    13
cpe:/a:w1.fi:wpa_supplicant:1.1
cpe:/a:w1.fi:wpa_supplicant:0.7.2
cpe:/a:w1.fi:wpa_supplicant:0.7.3
cpe:/a:w1.fi:wpa_supplicant:0.7.0
...

© SecPod Technologies