First published: Wed Feb 21 2018(Updated: )
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | 2:2.7+git20190128+0c1e29f-6+deb10u3 2:2.9.0-21 2:2.10-12 2:2.10-15 | |
W1.fi Wpa Supplicant | >=2.0<2.6 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-5315.
The severity rating of CVE-2015-5315 is medium (5.9).
CVE-2015-5315 allows remote attackers to cause a denial of service (process termination) in wpa_supplicant 2.x before 2.6 when EAP-pwd is enabled in a network configuration profile.
Yes, the fix for CVE-2015-5315 is available in wpa_supplicant version 2.7 onwards.
You can find more information about CVE-2015-5315 in the following references: [1] http://w1.fi/security/2015-7/eap-pwd-missing-last-fragment-length-validation.txt [2] http://www.openwall.com/lists/oss-security/2015/11/10/10 [3] http://www.ubuntu.com/usn/USN-2808-1