CVE-2015-4144 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Hostapd
Severity
5.0MEDIUMNVD
OSV4.3
EPSS
1.2%
top 21.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 15
Latest updateMay 14
Description
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.
CVSS vector
AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9
Affected Packages3 packages
🔴Vulnerability Details
4GHSA▶
GHSA-c7g5-57m7-29v3: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1↗2022-05-14
CVEList▶
CVE-2015-4144: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1↗2015-06-15
OSV▶
CVE-2015-4144: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1↗2015-06-15
📋Vendor Advisories
3💬Community
1Bugzilla▶
CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146 wpa_supplicant and hostapd: EAP-pwd missing payload length validation↗2015-05-07