5

CVE-2015-4145

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

Data is provided by the National Vulnerability Database (NVD)
W1.FiHostapd Version1.0
W1.FiHostapd Version1.1
W1.FiHostapd Version2.0
W1.FiHostapd Version2.1
W1.FiHostapd Version2.2
W1.FiHostapd Version2.3
W1.FiHostapd Version2.4
OpensuseOpensuse Version13.1
OpensuseOpensuse Version13.2
W1.FiWpa Supplicant Version1.0
W1.FiWpa Supplicant Version1.1
W1.FiWpa Supplicant Version2.0
W1.FiWpa Supplicant Version2.1
W1.FiWpa Supplicant Version2.2
W1.FiWpa Supplicant Version2.3
W1.FiWpa Supplicant Version2.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.21% 0.781
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P