First published: Tue Nov 10 2015(Updated: )
The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an EAP-pwd Confirm message followed by the Identity exchange.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | 2:2.7+git20190128+0c1e29f-6+deb10u3 2:2.9.0-21 2:2.10-12 2:2.10-15 | |
wpa supplicant | >=2.0<2.6 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5316 has been classified as a denial of service vulnerability due to a NULL pointer dereference leading to a daemon crash.
Upgrading to wpa_supplicant version 2.6 or later will resolve the vulnerability associated with CVE-2015-5316.
wpa_supplicant versions prior to 2.6 are affected by CVE-2015-5316.
CVE-2015-5316 can be exploited by sending a specially crafted EAP-pwd Confirm message.
CVE-2015-5316 impacts primarily Debian GNU/Linux versions 8.0 with wpa_supplicant configured for EAP-pwd.