First published: Mon Jun 15 2015(Updated: )
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | 2:2.7+git20190128+0c1e29f-6+deb10u3 2:2.9.0-21 2:2.10-12 2:2.10-15 | |
w1.fi hostapd | =1.0 | |
w1.fi hostapd | =1.1 | |
w1.fi hostapd | =2.0 | |
w1.fi hostapd | =2.1 | |
w1.fi hostapd | =2.2 | |
w1.fi hostapd | =2.3 | |
w1.fi hostapd | =2.4 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
wpa_supplicant | =1.0 | |
wpa_supplicant | =1.1 | |
wpa_supplicant | =2.0 | |
wpa_supplicant | =2.1 | |
wpa_supplicant | =2.2 | |
wpa_supplicant | =2.3 | |
wpa_supplicant | =2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4145 has been classified as a denial of service vulnerability due to a memory leak.
To fix CVE-2015-4145, upgrade to hostapd and wpa_supplicant versions that are later than 2.4.
Hostapd versions 1.0 through 2.4 are affected by CVE-2015-4145.
Wpa_supplicant versions 1.0 through 2.4 are vulnerable to CVE-2015-4145.
Yes, CVE-2015-4145 can lead to system downtime due to denial of service triggered by crafted messages.