CVE-2015-4146 PUBLISHED

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

EPSS 1.31% · 79.7th percentile

Risk Scores

EPSS Score
1.31%
79.7th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSwpa0, 1.0-3ubuntu2, 1.0-3ubuntu3

Timeline

References

Open in Interactive Console →