Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-4145

Опубликовано: 15 июн. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5

Описание

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

pending

2.5
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

released

2.1-0ubuntu8
esm-infra-legacy/trusty

released

2.1-0ubuntu1.3
precise

DNE

trusty

released

2.1-0ubuntu1.3
trusty/esm

released

2.1-0ubuntu1.3
upstream

pending

2.5
utopic

released

2.1-0ubuntu4.2
vivid

released

2.1-0ubuntu7.2
vivid/stable-phone-overlay

released

2.1-0ubuntu7.2
vivid/ubuntu-core

released

2.1-0ubuntu7.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

pending

2.5
utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 79%
0.01205
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

nvd
больше 10 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

debian
больше 10 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplica ...

github
больше 3 лет назад

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

suse-cvrf
больше 8 лет назад

Security update for hostapd

EPSS

Процентиль: 79%
0.01205
Низкий

5 Medium

CVSS2