The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2015-06-15T15:00:00
Updated: 2024-08-06T06:04:02.958Z
Reserved: 2015-05-31T00:00:00
Link: CVE-2015-4145
Vulnrichment
No data.
NVD
Status : Modified
Published: 2015-06-15T15:59:09.727
Modified: 2024-11-21T02:30:30.757
Link: CVE-2015-4145
Redhat