First published: Sat Feb 19 2005(Updated: )
Buffer overflow in wpa_supplicant before 0.2.7 allows remote attackers to cause a denial of service (segmentation fault) via invalid EAPOL-Key packet data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP Shop for HP Supplies | =0.2.4 | |
HP Shop for HP Supplies | =0.2.5 | |
HP Shop for HP Supplies | =0.2.1 | |
HP Shop for HP Supplies | =0.2.2 | |
HP Shop for HP Supplies | =0.2 | |
HP Shop for HP Supplies | =0.2.6 | |
HP Shop for HP Supplies | =0.2.3 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.2 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0470 has a high severity rating due to its potential to cause denial of service through remote exploitation.
To fix CVE-2005-0470, update wpa_supplicant to version 0.2.7 or later.
CVE-2005-0470 affects wpa_supplicant versions 0.2.1 to 0.2.6.
CVE-2005-0470 enables remote attackers to execute a denial of service by sending crafted EAPOL-Key packet data.
CVE-2005-0470 can be found in systems running vulnerable versions of wpa_supplicant, which may include certain distributions of Linux.