CVE-2019-11555 PUBLISHED

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

EPSS 13.90% · 94.2th percentile

Risk Scores

EPSS Score
13.90%
94.2th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSwpa0, 2.4-0ubuntu3, 2.4-0ubuntu4
Ubuntu:Pro:14.04:LTSwpa2.1-0ubuntu1.7, 2.1-0ubuntu1, 2.1-0ubuntu1.1
Ubuntu:18.04:LTSwpa2.4-0ubuntu10, 2:2.4-1.1ubuntu1, 2:2.6-15ubuntu1

Timeline

References

Open in Interactive Console →