CVE-2015-5315
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
La función eap_pwd_process en eap_peer/eap_pwd.c en wpa_supplicant, en versiones 2.x anteriores a la 2.6, no valida que el búfer de reensamblaje sea lo bastante grande para el fragmento final cuando EAP-pwd está habilitado en un perfil de configuración de red. Esto permite que atacantes remotos provoquen una denegación de servicio (finalización del proceso) mediante un fragmento final grande en un mensaje EAP-pwd.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-07-01 CVE Reserved
- 2015-11-10 CVE Published
- 2023-09-17 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/10/10 | 2018-03-21 |
URL | Date | SRC |
---|---|---|
http://w1.fi/security/2015-7/eap-pwd-missing-last-fragment-length-validation.txt | 2018-03-21 | |
http://www.ubuntu.com/usn/USN-2808-1 | 2018-03-21 | |
https://www.debian.org/security/2015/dsa-3397 | 2018-03-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
W1.fi Search vendor "W1.fi" | WPA Supplicant Search vendor "W1.fi" for product "WPA Supplicant" | >= 2.0 < 2.6 Search vendor "W1.fi" for product "WPA Supplicant" and version " >= 2.0 < 2.6" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|