CVE-2015-4143 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Hostapd
Severity
5.0MEDIUMNVD
OSV4.3
EPSS
1.2%
top 21.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 15
Latest updateMay 14
Description
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
CVSS vector
AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9
Affected Packages3 packages
🔴Vulnerability Details
4GHSA▶
GHSA-jrqr-5j62-r5j7: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1↗2022-05-14
OSV▶
CVE-2015-4143: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1↗2015-06-15
CVEList▶
CVE-2015-4143: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1↗2015-06-15
📋Vendor Advisories
3💬Community
1Bugzilla▶
CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146 wpa_supplicant and hostapd: EAP-pwd missing payload length validation↗2015-05-07