
CVE-2015-4141 – Ubuntu Security Notice USN-2650-1
https://notcve.org/view.php?id=CVE-2015-4141
15 Jun 2015 — The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow. La función WPS UPnP en hostapd, cuando utiliza WPS AP, y wpa_supplicant, cuando utiliza el registro externo WPS (ER), 0.7.0 hasta 2.4 permite a atacantes remotos causar una denegación de servicio (caída) a través de una lon... • http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-4143 – Ubuntu Security Notice USN-2650-1
https://notcve.org/view.php?id=CVE-2015-4143
15 Jun 2015 — The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload. La implementación EAP-pwd server and peer en hostapd y wpa_supplicant 1.0 hasta 2.4 permite a atacantes remotos causar una denegación de servicio (lectura fuera de rango y caída) a través de una carga útil de mensaje (1) Commit o (2) Confirm manipulada. Kostya Kortchinsky discovere... • http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-4144 – Ubuntu Security Notice USN-2650-1
https://notcve.org/view.php?id=CVE-2015-4144
15 Jun 2015 — The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message. La implementación EAP-pwd server and peer en hostapd y wpa_supplicant 1.0 hasta 2.4 no valida que un mensaje tiene la longitud suficiente para contener el campo Total-Length, lo que permite a atacantes remotos causar una denegación de servicio (caída... • http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-4145 – Ubuntu Security Notice USN-2650-1
https://notcve.org/view.php?id=CVE-2015-4145
15 Jun 2015 — The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message. La implementación EAP-pwd server and peer en hostapd y wpa_supplicant 1.0 hasta 2.4 no valida si un fragmento ya está siendo procesado, lo que permite a atacantes remotos causar una denegación de servicio (fuga de memoria) a través de un mensaje manipulado. Kostya Kortc... • http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html • CWE-399: Resource Management Errors •

CVE-2015-4146 – Ubuntu Security Notice USN-2650-1
https://notcve.org/view.php?id=CVE-2015-4146
15 Jun 2015 — The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message. La implementación EAP-pwd peer en hostapd y wpa_supplicant 1.0 hasta 2.4 no limpia los indicadores L (Length) y M (More) antes de determinar si una respuesta debe ser fragmentada, lo que permite a atacantes remotos causar una denegación de ... • http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html •

CVE-2015-4142 – hostapd: integer underflow in AP mode WMM Action frame processing
https://notcve.org/view.php?id=CVE-2015-4142
11 Jun 2015 — Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read. Subdesbordamiento de enteros en el analizador sintáctico Frame de WMM Action en hostapd 0.5.5 hasta 2.4 y wpa_supplicant 0.7.0 hasta 2.4, cuando utilizado para la funcionalidad MLME/SME del modo AP, permite a atacantes remotos cau... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171401.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVE-2015-1863 – wpa_supplicant: P2P SSID processing vulnerability
https://notcve.org/view.php?id=CVE-2015-1863
23 Apr 2015 — Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries. Desbordamiento de buffer basado en memoria dinámica en wpa_supplicant 1.0 hasta 2.4 permite a atacantes remotos causar una denegación de servicio (caída), leer la memoria o posiblemente ejecutar código arbitrario a través de información SSID manipulad... • http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00000.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVE-2014-3686 – hostapd: wpa_cli and hostapd_cli remote command execution issue
https://notcve.org/view.php?id=CVE-2014-3686
14 Oct 2014 — wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame. wpa_supplicant y hostapd 0.7.2 hasta 2.2 cuando se ejecutan ciertas configuraciones y se utilizan los secuencias de comandos using_wpa_cli o hostapd_cli, permite a atacantes remotos ejecutar comandos arbitrarios a través de un frame manipulado. A command injection flaw was found in the way the w... • http://advisories.mageia.org/MGASA-2014-0429.html • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2007-6025
https://notcve.org/view.php?id=CVE-2007-6025
19 Nov 2007 — Stack-based buffer overflow in driver_wext.c in wpa_supplicant 0.6.0 and earlier allows remote attackers to cause a denial of service (crash) via crafted TSF data. Desbordamiento de búfer en driver_wext.c de wpa_supplicant 0.6.0 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída) mediante datos TSF manipulados. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442387 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2005-0470
https://notcve.org/view.php?id=CVE-2005-0470
19 Feb 2005 — Buffer overflow in wpa_supplicant before 0.2.7 allows remote attackers to cause a denial of service (segmentation fault) via invalid EAPOL-Key packet data. • http://lists.shmoo.com/pipermail/hostap/2005-February/009465.html •