CVE-2019-11555
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
La implementación de EAP-pwd en hostapd (servidor EAP),versiones anteriores a 2.8, y wpa_supplicant (peer EAP), versiones anteriores a 2.8, no valida correctamente el estado de reensamblado de la fragmentación para un caso en el que se pudiera recibir un fragmento no esperado. Esto podría derivar en la terminación del proceso debido a una derivación de un puntero NULL (denegación de servicio). Esto afecta a eap_server/eap_server_pwd.c y eap_peer/eap_pwd.c.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-04-26 CVE Reserved
- 2019-04-26 CVE Published
- 2024-08-04 CVE Updated
- 2024-09-16 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-476: NULL Pointer Dereference
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2019/07/msg00030.html | Mailing List | |
https://seclists.org/bugtraq/2019/May/40 | Mailing List | |
https://seclists.org/bugtraq/2019/May/64 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/04/26/1 | 2023-11-07 | |
https://w1.fi/security/2019-5 | 2023-11-07 | |
https://www.openwall.com/lists/oss-security/2019/04/18/6 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
W1.fi Search vendor "W1.fi" | Hostapd Search vendor "W1.fi" for product "Hostapd" | < 2.8 Search vendor "W1.fi" for product "Hostapd" and version " < 2.8" | - |
Affected
| ||||||
W1.fi Search vendor "W1.fi" | WPA Supplicant Search vendor "W1.fi" for product "WPA Supplicant" | < 2.8 Search vendor "W1.fi" for product "WPA Supplicant" and version " < 2.8" | - |
Affected
|