CVE-2015-5314

The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS server and EAP-pwd is enabled in a runtime configuration, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.9 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 80%
VendorProductVersion
w1.fiwpa_supplicant
2.0 ≤
𝑥
< 2.6
debiandebian_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wpa
bullseye (security)
2:2.9.0-21+deb11u2
fixed
bullseye
2:2.9.0-21+deb11u2
fixed
wheezy
not-affected
bookworm
2:2.10-12+deb12u2
fixed
bookworm (security)
2:2.10-12+deb12u2
fixed
sid
2:2.10-22
fixed
trixie
2:2.10-22
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
hostapd
wily
dne
vivid
dne
trusty
dne
precise
not-affected
wpa
wily
Fixed 2.4-0ubuntu3.2
released
vivid
Fixed 2.1-0ubuntu7.3
released
trusty
Fixed 2.1-0ubuntu1.4
released
precise
dne