Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-4146

Опубликовано: 15 июн. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 5

Описание

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

pending

2.5
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

released

2.1-0ubuntu8
esm-infra-legacy/trusty

released

2.1-0ubuntu1.3
precise

DNE

trusty

released

2.1-0ubuntu1.3
trusty/esm

released

2.1-0ubuntu1.3
upstream

pending

2.5
utopic

released

2.1-0ubuntu4.2
vivid

released

2.1-0ubuntu7.2
vivid/stable-phone-overlay

released

2.1-0ubuntu7.2
vivid/ubuntu-core

released

2.1-0ubuntu7.2

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

not-affected

code not present
trusty

DNE

trusty/esm

DNE

upstream

pending

2.5
utopic

DNE

vivid

DNE

Показывать по

5 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

nvd
больше 10 лет назад

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

debian
больше 10 лет назад

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 thro ...

github
больше 3 лет назад

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

5 Medium

CVSS2