First published: Sun Aug 16 2015(Updated: )
Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/wpa | 2:2.7+git20190128+0c1e29f-6+deb10u3 2:2.9.0-21 2:2.10-12 2:2.10-15 | |
wpa_supplicant | <=2.4 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
hostapd | <=2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8041 has a high severity level due to its potential to cause denial of service.
To fix CVE-2015-8041, update to hostapd version 2.5 or higher and wpa_supplicant version 2.5 or higher.
CVE-2015-8041 affects versions of hostapd and wpa_supplicant prior to 2.5, as well as certain versions of openSUSE.
CVE-2015-8041 exploits vulnerabilities in WPS and P2P NFC NDEF records.
Exploitation of CVE-2015-8041 can lead to process crashes or infinite loops in affected systems.