CVE Vulnerabilities

CVE-2015-4145

Published: Jun 15, 2015 | Modified: Oct 30, 2018
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
2.9 LOW
AV:A/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

Affected Software

Name Vendor Start Version End Version
Hostapd W1.fi 1.0 (including) 1.0 (including)
Hostapd W1.fi 1.1 (including) 1.1 (including)
Hostapd W1.fi 2.0 (including) 2.0 (including)
Hostapd W1.fi 2.1 (including) 2.1 (including)
Hostapd W1.fi 2.2 (including) 2.2 (including)
Hostapd W1.fi 2.3 (including) 2.3 (including)
Hostapd W1.fi 2.4 (including) 2.4 (including)
Hostapd Ubuntu upstream *
Wpa Ubuntu devel *
Wpa Ubuntu trusty *
Wpa Ubuntu upstream *
Wpa Ubuntu utopic *
Wpa Ubuntu vivid *
Wpa Ubuntu vivid/stable-phone-overlay *
Wpa Ubuntu vivid/ubuntu-core *
Wpasupplicant Ubuntu upstream *

References