First published: Sun May 31 2015(Updated: )
Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
Credit: Kostya Kortchinsky Google Security Team cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | 2:2.7+git20190128+0c1e29f-6+deb10u3 2:2.9.0-21 2:2.10-12 2:2.10-15 | |
Apple iOS | <15.5 | 15.5 |
Apple iPadOS | <15.5 | 15.5 |
W1.fi Wpa Supplicant | =0.7.0 | |
W1.fi Wpa Supplicant | =0.7.1 | |
W1.fi Wpa Supplicant | =0.7.2 | |
W1.fi Wpa Supplicant | =0.7.3 | |
W1.fi Wpa Supplicant | =1.0 | |
W1.fi Wpa Supplicant | =1.1 | |
W1.fi Wpa Supplicant | =2.0 | |
W1.fi Wpa Supplicant | =2.1 | |
W1.fi Wpa Supplicant | =2.2 | |
W1.fi Wpa Supplicant | =2.3 | |
W1.fi Wpa Supplicant | =2.4 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Hpc Node | =6.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
W1.fi Hostapd | =0.7.0 | |
W1.fi Hostapd | =0.7.1 | |
W1.fi Hostapd | =0.7.2 | |
W1.fi Hostapd | =0.7.3 | |
W1.fi Hostapd | =1.0 | |
W1.fi Hostapd | =1.1 | |
W1.fi Hostapd | =2.0 | |
W1.fi Hostapd | =2.1 | |
W1.fi Hostapd | =2.2 | |
W1.fi Hostapd | =2.3 | |
W1.fi Hostapd | =2.4 | |
openSUSE openSUSE | =13.1 | |
openSUSE openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2015-4142.
The affected software is Apple iOS and Apple iPadOS versions up to 15.5.
This issue was addressed with improved checks.
You can find more information about this issue at the following link: [https://support.apple.com/en-us/HT213258](https://support.apple.com/en-us/HT213258).