Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-4142

Опубликовано: 04 мая 2015
Источник: redhat
CVSS2: 2.9
EPSS Низкий

Описание

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.

An integer underflow flaw, leading to a buffer over-read, was found in the way wpa_supplicant handled WMM Action frames. A specially crafted frame could possibly allow an attacker within Wi-Fi radio range to cause wpa_supplicant to crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantNot affected
Red Hat Enterprise Linux 6wpa_supplicantFixedRHSA-2015:143920.07.2015
Red Hat Enterprise Linux 7wpa_supplicantFixedRHSA-2015:109011.06.2015

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-190->CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1221178hostapd: integer underflow in AP mode WMM Action frame processing

EPSS

Процентиль: 91%
0.07071
Низкий

2.9 Low

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.

nvd
около 10 лет назад

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.

debian
около 10 лет назад

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 thro ...

github
больше 3 лет назад

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.

oracle-oval
около 10 лет назад

ELSA-2015-1439: wpa_supplicant security and enhancement update (LOW)

EPSS

Процентиль: 91%
0.07071
Низкий

2.9 Low

CVSS2