The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
2015-06-15T15:59:07.913
2025-04-12T10:46:40.837
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | w1.fi | wpa_supplicant | 1.0 | Yes |
Application | w1.fi | wpa_supplicant | 1.1 | Yes |
Application | w1.fi | wpa_supplicant | 2.0 | Yes |
Application | w1.fi | wpa_supplicant | 2.1 | Yes |
Application | w1.fi | wpa_supplicant | 2.2 | Yes |
Application | w1.fi | wpa_supplicant | 2.3 | Yes |
Application | w1.fi | wpa_supplicant | 2.4 | Yes |
Application | w1.fi | hostapd | 1.0 | Yes |
Application | w1.fi | hostapd | 1.1 | Yes |
Application | w1.fi | hostapd | 2.0 | Yes |
Application | w1.fi | hostapd | 2.1 | Yes |
Application | w1.fi | hostapd | 2.2 | Yes |
Application | w1.fi | hostapd | 2.3 | Yes |
Application | w1.fi | hostapd | 2.4 | Yes |
Operating System | opensuse | opensuse | 13.1 | Yes |
Operating System | opensuse | opensuse | 13.2 | Yes |