CVE-2015-4141

The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:w1.fi:wpa_supplicant:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:w1.fi:hostapd:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html - Third Party Advisory
References () http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt - Vendor Advisory () http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3397 - () http://www.debian.org/security/2015/dsa-3397 -
References () http://www.openwall.com/lists/oss-security/2015/05/09/4 - Mailing List () http://www.openwall.com/lists/oss-security/2015/05/09/4 - Mailing List
References () http://www.openwall.com/lists/oss-security/2015/05/31/6 - Mailing List () http://www.openwall.com/lists/oss-security/2015/05/31/6 - Mailing List
References () http://www.ubuntu.com/usn/USN-2650-1 - () http://www.ubuntu.com/usn/USN-2650-1 -
References () https://security.gentoo.org/glsa/201606-17 - Third Party Advisory () https://security.gentoo.org/glsa/201606-17 - Third Party Advisory

Information

Published : 2015-06-15 15:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-4141

Mitre link : CVE-2015-4141

CVE.ORG link : CVE-2015-4141


JSON object : View

Products Affected

w1.fi

  • wpa_supplicant
  • hostapd

opensuse

  • opensuse
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer