Описание
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.4-0ubuntu5 |
| esm-infra-legacy/trusty | released | 2.1-0ubuntu1.4 |
| precise | DNE | |
| trusty | released | 2.1-0ubuntu1.4 |
| trusty/esm | released | 2.1-0ubuntu1.4 |
| upstream | needs-triage | |
| vivid | released | 2.1-0ubuntu7.3 |
| vivid/stable-phone-overlay | released | 2.1-0ubuntu7.3 |
| vivid/ubuntu-core | released | 2.1-0ubuntu7.3 |
| wily | released | 2.4-0ubuntu3.2 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| precise | not-affected | code not present |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | needs-triage | |
| vivid | DNE | |
| wily | DNE |
Показывать по
4.3 Medium
CVSS2
5.9 Medium
CVSS3
Связанные уязвимости
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2 ...
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
4.3 Medium
CVSS2
5.9 Medium
CVSS3