CVE-2015-4144 in hostapd
Resumen (Inglés)
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.
Reservar
2015-05-31
Divulgación
2015-06-15
Voces
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerabilidad | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 75890 | hostapd/wpa_supplicant EAP-pwd Server desbordamiento de búfer | 119 | No está definido | Arreglo oficial | CVE-2015-4144 |