Логотип exploitDog
bind:CVE-2019-11555
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-11555

Количество 11

Количество 11

ubuntu логотип

CVE-2019-11555

почти 7 лет назад

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.9
EPSS: Низкий
redhat логотип

CVE-2019-11555

почти 7 лет назад

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2019-11555

почти 7 лет назад

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.9
EPSS: Низкий
debian логотип

CVE-2019-11555

почти 7 лет назад

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_ ...

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-3r3j-9m7c-h35g

больше 3 лет назад

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2020-00775

почти 7 лет назад

Уязвимость функции wpa_supplicant сервера EAP hostapd, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3424-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:1853-1

больше 3 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2059-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2053-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3380-1

около 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-11555

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.9
9%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-11555

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.3
9%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-11555

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.9
9%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-11555

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_ ...

CVSS3: 5.9
9%
Низкий
почти 7 лет назад
github логотип
GHSA-3r3j-9m7c-h35g

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

CVSS3: 5.9
9%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-00775

Уязвимость функции wpa_supplicant сервера EAP hostapd, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.9
9%
Низкий
почти 7 лет назад
suse-cvrf логотип
SUSE-SU-2020:3424-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2022:1853-1

Security update for wpa_supplicant

больше 3 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2059-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2053-1

Security update for wpa_supplicant

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3380-1

Security update for wpa_supplicant

около 5 лет назад

Уязвимостей на страницу