Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f2m4-x3g9-fqq7

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

EPSS

Процентиль: 79%
0.01312
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

redhat
почти 11 лет назад

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

nvd
больше 10 лет назад

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

debian
больше 10 лет назад

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 thro ...

EPSS

Процентиль: 79%
0.01312
Низкий