CVE-2015-4145 PUBLISHED

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

EPSS 1.21% · 78.9th percentile

Risk Scores

EPSS Score
1.21%
78.9th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSwpa0, 1.0-3ubuntu2, 1.0-3ubuntu3

Timeline

References

Open in Interactive Console →