Show filters
19 Total Results
Displaying 11-19 of 19
Sort by:
Attacker Value
Unknown
CVE-2015-0210
Disclosure Date: August 28, 2017 (last updated November 26, 2024)
wpa_supplicant 2.0-16 does not properly check certificate subject name, which allows remote attackers to cause a man-in-the-middle attack.
0
Attacker Value
Unknown
CVE-2015-4143
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
0
Attacker Value
Unknown
CVE-2015-4142
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
0
Attacker Value
Unknown
CVE-2015-4146
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.
0
Attacker Value
Unknown
CVE-2015-4145
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.
0
Attacker Value
Unknown
CVE-2015-4141
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
0
Attacker Value
Unknown
CVE-2015-4144
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.
0
Attacker Value
Unknown
CVE-2015-1863
Disclosure Date: April 28, 2015 (last updated October 05, 2023)
Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
0
Attacker Value
Unknown
CVE-2014-3686
Disclosure Date: October 16, 2014 (last updated October 05, 2023)
wpa_supplicant and hostapd 0.7.2 through 2.2, when running with certain configurations and using wpa_cli or hostapd_cli with action scripts, allows remote attackers to execute arbitrary commands via a crafted frame.
0