Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-4143

Опубликовано: 15 июн. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 5

Описание

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

pending

2.5
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

released

2.1-0ubuntu8
esm-infra-legacy/trusty

released

2.1-0ubuntu1.3
precise

DNE

trusty

released

2.1-0ubuntu1.3
trusty/esm

released

2.1-0ubuntu1.3
upstream

pending

2.5
utopic

released

2.1-0ubuntu4.2
vivid

released

2.1-0ubuntu7.2
vivid/stable-phone-overlay

released

2.1-0ubuntu7.2
vivid/ubuntu-core

released

2.1-0ubuntu7.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

pending

2.5
utopic

DNE

vivid

DNE

Показывать по

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.

nvd
больше 10 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.

debian
больше 10 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplica ...

github
больше 3 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.

fstec
больше 10 лет назад

Уязвимость операционной системы openSUSE, клиента защищённого доступа Wi-Fi WPA Supplicant, программной точки доступа Jouni Malinen Hostapd, позволяющая нарушителю вызвать отказ в обслуживании

5 Medium

CVSS2