First published: Sat Feb 19 2005(Updated: )
Buffer overflow in wpa_supplicant before 0.2.7 allows remote attackers to cause a denial of service (segmentation fault) via invalid EAPOL-Key packet data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wpa Supplicant Wpa Supplicant | =0.2.4 | |
Wpa Supplicant Wpa Supplicant | =0.2.5 | |
Wpa Supplicant Wpa Supplicant | =0.2.1 | |
Wpa Supplicant Wpa Supplicant | =0.2.2 | |
Wpa Supplicant Wpa Supplicant | =0.2 | |
Wpa Supplicant Wpa Supplicant | =0.2.6 | |
Wpa Supplicant Wpa Supplicant | =0.2.3 | |
Suse Suse Linux | =9.2 | |
Suse Suse Linux | =9.2 | |
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.