CVE-2015-4141 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Hostapd
Severity
4.3MEDIUMNVD
EPSS
1.5%
top 19.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 15
Latest updateMay 14
Description
The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
CVSS vector
AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9
Affected Packages3 packages
🔴Vulnerability Details
4GHSA▶
GHSA-fr6x-5vfp-hc79: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0↗2022-05-14
CVEList▶
CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0↗2015-06-15
OSV▶
CVE-2015-4141: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0↗2015-06-15
📋Vendor Advisories
3💬Community
1Bugzilla▶
CVE-2015-4141 wpa_supplicant and hostapd: WPS UPnP vulnerability with HTTP chunked transfer encoding↗2015-05-13