Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c7g5-57m7-29v3

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.

EPSS

Процентиль: 79%
0.01205
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 10 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.

redhat
почти 11 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.

nvd
больше 10 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.

debian
больше 10 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplica ...

fstec
больше 10 лет назад

Уязвимость операционной системы openSUSE, клиента защищённого доступа Wi-Fi WPA Supplicant, программной точки доступа Jouni Malinen Hostapd, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 79%
0.01205
Низкий

Дефекты

CWE-119