// For flags

CVE-2015-4141

Ubuntu Security Notice USN-2650-1

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.

La función WPS UPnP en hostapd, cuando utiliza WPS AP, y wpa_supplicant, cuando utiliza el registro externo WPS (ER), 0.7.0 hasta 2.4 permite a atacantes remotos causar una denegación de servicio (caída) a través de una longitud de chunk negativa, lo que provoca una lectura fuera de rango o un desbordamiento de buffer basado en memoria dinámica.

Kostya Kortchinsky discovered multiple flaws in wpa_supplicant and hostapd. A remote attacker could use these issues to cause wpa_supplicant or hostapd to crash, resulting in a denial of service.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2015-05-31 CVE Reserved
  • 2015-06-15 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-05-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
0.7.0
Search vendor "W1.fi" for product "WPA Supplicant" and version "0.7.0"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
0.7.1
Search vendor "W1.fi" for product "WPA Supplicant" and version "0.7.1"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
0.7.2
Search vendor "W1.fi" for product "WPA Supplicant" and version "0.7.2"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
0.7.3
Search vendor "W1.fi" for product "WPA Supplicant" and version "0.7.3"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
1.0
Search vendor "W1.fi" for product "WPA Supplicant" and version "1.0"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
1.1
Search vendor "W1.fi" for product "WPA Supplicant" and version "1.1"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
2.0
Search vendor "W1.fi" for product "WPA Supplicant" and version "2.0"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
2.1
Search vendor "W1.fi" for product "WPA Supplicant" and version "2.1"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
2.2
Search vendor "W1.fi" for product "WPA Supplicant" and version "2.2"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
2.3
Search vendor "W1.fi" for product "WPA Supplicant" and version "2.3"
-
Affected
W1.fi
Search vendor "W1.fi"
WPA Supplicant
Search vendor "W1.fi" for product "WPA Supplicant"
2.4
Search vendor "W1.fi" for product "WPA Supplicant" and version "2.4"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
0.7.0
Search vendor "W1.fi" for product "Hostapd" and version "0.7.0"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
0.7.1
Search vendor "W1.fi" for product "Hostapd" and version "0.7.1"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
0.7.2
Search vendor "W1.fi" for product "Hostapd" and version "0.7.2"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
0.7.3
Search vendor "W1.fi" for product "Hostapd" and version "0.7.3"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
1.0
Search vendor "W1.fi" for product "Hostapd" and version "1.0"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
1.1
Search vendor "W1.fi" for product "Hostapd" and version "1.1"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
2.0
Search vendor "W1.fi" for product "Hostapd" and version "2.0"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
2.1
Search vendor "W1.fi" for product "Hostapd" and version "2.1"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
2.2
Search vendor "W1.fi" for product "Hostapd" and version "2.2"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
2.3
Search vendor "W1.fi" for product "Hostapd" and version "2.3"
-
Affected
W1.fi
Search vendor "W1.fi"
Hostapd
Search vendor "W1.fi" for product "Hostapd"
2.4
Search vendor "W1.fi" for product "Hostapd" and version "2.4"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.1
Search vendor "Opensuse" for product "Opensuse" and version "13.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Opensuse
Search vendor "Opensuse" for product "Opensuse"
13.2
Search vendor "Opensuse" for product "Opensuse" and version "13.2"
-
Affected