First published: Sun May 31 2015(Updated: )
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | 2:2.7+git20190128+0c1e29f-6+deb10u3 2:2.9.0-21 2:2.10-12 2:2.10-15 | |
wpa_supplicant | =1.0 | |
wpa_supplicant | =1.1 | |
wpa_supplicant | =2.0 | |
wpa_supplicant | =2.1 | |
wpa_supplicant | =2.2 | |
wpa_supplicant | =2.3 | |
wpa_supplicant | =2.4 | |
hostapd | =1.0 | |
hostapd | =1.1 | |
hostapd | =2.0 | |
hostapd | =2.1 | |
hostapd | =2.2 | |
hostapd | =2.3 | |
hostapd | =2.4 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4143 has been classified as a denial of service vulnerability that can lead to a crash.
To fix CVE-2015-4143, you should upgrade to the patched versions of hostapd and wpa_supplicant, specifically versions 2.7+git20190128+0c1e29f-6+deb10u3 or higher.
CVE-2015-4143 affects hostapd and wpa_supplicant versions from 1.0 to 2.4.
Yes, CVE-2015-4143 can be exploited by remote attackers through crafted Commit or Confirm message payloads.
An out-of-bounds read in CVE-2015-4143 can lead to a denial of service by causing an application crash.