CVE-2015-4142Improper Restriction of Operations within the Bounds of a Memory Buffer in Hostapd

Severity
4.3MEDIUMNVD
EPSS
7.1%
top 8.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 15
Latest updateMay 16

Description

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages7 packages

NVDw1.fi/hostapd11 versions+10
NVDopensuse/opensuse13.1, 13.2+1
NVDw1.fi/wpa_supplicant11 versions+10

🔴Vulnerability Details

4
GHSA
GHSA-r4j8-fwxp-qfmx: Integer underflow in the WMM Action frame parser in hostapd 02022-05-14
OSV
wpa, wpasupplicant vulnerabilities2015-06-16
OSV
CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd 02015-06-15
CVEList
CVE-2015-4142: Integer underflow in the WMM Action frame parser in hostapd 02015-06-15

📋Vendor Advisories

4
Apple
CVE-2015-4142: iOS 15.5 and iPadOS 15.52022-05-16
Ubuntu
wpa_supplicant and hostapd vulnerabilities2015-06-16
Red Hat
hostapd: integer underflow in AP mode WMM Action frame processing2015-05-04
Debian
CVE-2015-4142: wpa - Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 an...2015

💬Community

1
Bugzilla
CVE-2015-4142 wpa_supplicant and hostapd: integer underflow in AP mode WMM Action frame processing2015-05-13
CVE-2015-4142 — W1.fi Hostapd vulnerability | cvebase