First published: Sun May 31 2015(Updated: )
The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | 2:2.7+git20190128+0c1e29f-6+deb10u3 2:2.9.0-21 2:2.10-12 2:2.10-15 | |
wpa supplicant | =0.7.0 | |
wpa supplicant | =0.7.1 | |
wpa supplicant | =0.7.2 | |
wpa supplicant | =0.7.3 | |
wpa supplicant | =1.0 | |
wpa supplicant | =1.1 | |
wpa supplicant | =2.0 | |
wpa supplicant | =2.1 | |
wpa supplicant | =2.2 | |
wpa supplicant | =2.3 | |
wpa supplicant | =2.4 | |
w1.fi hostapd | =0.7.0 | |
w1.fi hostapd | =0.7.1 | |
w1.fi hostapd | =0.7.2 | |
w1.fi hostapd | =0.7.3 | |
w1.fi hostapd | =1.0 | |
w1.fi hostapd | =1.1 | |
w1.fi hostapd | =2.0 | |
w1.fi hostapd | =2.1 | |
w1.fi hostapd | =2.2 | |
w1.fi hostapd | =2.3 | |
w1.fi hostapd | =2.4 | |
openSUSE | =13.1 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4141 has been classified as a denial of service vulnerability that can lead to a crash in affected software.
To fix CVE-2015-4141, update to versions of wpa_supplicant and hostapd that are above the affected versions, specifically those later than 2.4 for wpa_supplicant and 2.4 for hostapd.
CVE-2015-4141 affects wpa_supplicant versions from 0.7.0 through 2.4 and hostapd versions from 0.7.0 through 2.4.
CVE-2015-4141 is caused by the WPS UPnP function handling a negative chunk length, leading to an out-of-bounds read or heap-based buffer overflow.
CVE-2015-4141 can be exploited by remote attackers who can send specially crafted requests to trigger the denial of service condition.