2 results (0.005 seconds)

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Stack-based buffer overflow in driver_wext.c in wpa_supplicant 0.6.0 and earlier allows remote attackers to cause a denial of service (crash) via crafted TSF data. Desbordamiento de búfer en driver_wext.c de wpa_supplicant 0.6.0 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída) mediante datos TSF manipulados. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442387 http://www.mandriva.com/security/advisories?name=MDKSA-2007:245 http://www.securityfocus.com/bid/26555 https://bugzilla.redhat.com/show_bug.cgi?id=292991 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 10EXPL: 0

Buffer overflow in wpa_supplicant before 0.2.7 allows remote attackers to cause a denial of service (segmentation fault) via invalid EAPOL-Key packet data. • http://lists.shmoo.com/pipermail/hostap/2005-February/009465.html http://secunia.com/advisories/14313 http://securitytracker.com/id?1013226 http://www.gentoo.org/security/en/glsa/glsa-200502-22.xml https://exchange.xforce.ibmcloud.com/vulnerabilities/19357 •