Описание
The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| precise | not-affected | code not present |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | pending | 2.5 |
| utopic | DNE | |
| vivid | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.1-0ubuntu8 |
| esm-infra-legacy/trusty | released | 2.1-0ubuntu1.3 |
| precise | DNE | |
| trusty | released | 2.1-0ubuntu1.3 |
| trusty/esm | released | 2.1-0ubuntu1.3 |
| upstream | pending | 2.5 |
| utopic | released | 2.1-0ubuntu4.2 |
| vivid | released | 2.1-0ubuntu7.2 |
| vivid/stable-phone-overlay | released | 2.1-0ubuntu7.2 |
| vivid/ubuntu-core | released | 2.1-0ubuntu7.2 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| precise | not-affected | code not present |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | pending | 2.5 |
| utopic | DNE | |
| vivid | DNE |
Показывать по
Ссылки на источники
5 Medium
CVSS2
Связанные уязвимости
The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.
The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.
The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 thro ...
The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.
5 Medium
CVSS2