CVE-2015-1863Improper Restriction of Operations within the Bounds of a Memory Buffer in WPA Supplicant

Severity
5.8MEDIUMNVD
EPSS
8.5%
top 7.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 28
Latest updateMay 14

Description

Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.

CVSS vector

AV:A/AC:L/C:P/I:P/A:PExploitability: 6.5 | Impact: 6.4

Affected Packages6 packages

Also affects: Debian Linux 7.0, 8.0, Ubuntu Linux 14.04, 14.10, 15.04, Enterprise Linux 7.1

🔴Vulnerability Details

3
GHSA
GHSA-5mh9-2ph2-m7gj: Heap-based buffer overflow in wpa_supplicant 12022-05-14
OSV
CVE-2015-1863: Heap-based buffer overflow in wpa_supplicant 12015-04-28
CVEList
CVE-2015-1863: Heap-based buffer overflow in wpa_supplicant 12015-04-28

📋Vendor Advisories

4
Android
CVE-2015-1863: Android Security Bulletin 2015-08-01 CVE: CVE-2015-1863 Severity: HIGH Affected AOSP versions: 52015-08-01
Ubuntu
wpa_supplicant vulnerability2015-04-23
Red Hat
wpa_supplicant: P2P SSID processing vulnerability2015-04-22
Debian
CVE-2015-1863: wpa - Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attac...2015

💬Community

2
Bugzilla
CVE-2015-1863 wpa_supplicant: P2P SSID processing vulnerability [fedora-all]2015-04-24
Bugzilla
CVE-2015-1863 wpa_supplicant: P2P SSID processing vulnerability2015-04-13
CVE-2015-1863 — W1.fi WPA Supplicant vulnerability | cvebase