CVE-2015-5314Improper Restriction of Operations within the Bounds of a Memory Buffer in WPA Supplicant

Severity
5.9MEDIUMNVD
OSV4.3
EPSS
1.1%
top 21.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 21
Latest updateMay 14

Description

The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS server and EAP-pwd is enabled in a runtime configuration, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages1 packages

NVDw1.fi/wpa_supplicant2.02.6

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-q29f-crhg-mxh3: The eap_pwd_process function in eap_server/eap_server_pwd2022-05-14
OSV
CVE-2015-5314: The eap_pwd_process function in eap_server/eap_server_pwd2018-02-21
CVEList
CVE-2015-5314: The eap_pwd_process function in eap_server/eap_server_pwd2018-02-21
OSV
wpa vulnerabilities2015-11-10

📋Vendor Advisories

2
Ubuntu
wpa_supplicant and hostapd vulnerabilities2015-11-10
Debian
CVE-2015-5314: wpa - The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x befor...2015

💬Community

1
Bugzilla
CVE-2015-5314 hostapd: EAP-pwd missing last fragment length validation2015-11-05
CVE-2015-5314 — W1.fi WPA Supplicant vulnerability | cvebase