CVE-2015-4142

Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171401.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172608.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172655.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1090.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1439.html
http://seclists.org/fulldisclosure/2022/May/34
http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt Vendor Advisory
http://www.debian.org/security/2015/dsa-3397
http://www.openwall.com/lists/oss-security/2015/05/09/5
http://www.openwall.com/lists/oss-security/2015/05/31/6
http://www.securitytracker.com/id/1032625
http://www.ubuntu.com/usn/USN-2650-1
https://security.gentoo.org/glsa/201606-17 Third Party Advisory
https://support.apple.com/kb/HT213258
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171401.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172608.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172655.html
http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1090.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1439.html
http://seclists.org/fulldisclosure/2022/May/34
http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt Vendor Advisory
http://www.debian.org/security/2015/dsa-3397
http://www.openwall.com/lists/oss-security/2015/05/09/5
http://www.openwall.com/lists/oss-security/2015/05/31/6
http://www.securitytracker.com/id/1032625
http://www.ubuntu.com/usn/USN-2650-1
https://security.gentoo.org/glsa/201606-17 Third Party Advisory
https://support.apple.com/kb/HT213258
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:w1.fi:wpa_supplicant:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:w1.fi:hostapd:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171401.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171401.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172608.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172608.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172655.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172655.html -
References () http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html - Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-1090.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2015-1090.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2015-1439.html - () http://rhn.redhat.com/errata/RHSA-2015-1439.html -
References () http://seclists.org/fulldisclosure/2022/May/34 - () http://seclists.org/fulldisclosure/2022/May/34 -
References () http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt - Vendor Advisory () http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3397 - () http://www.debian.org/security/2015/dsa-3397 -
References () http://www.openwall.com/lists/oss-security/2015/05/09/5 - () http://www.openwall.com/lists/oss-security/2015/05/09/5 -
References () http://www.openwall.com/lists/oss-security/2015/05/31/6 - () http://www.openwall.com/lists/oss-security/2015/05/31/6 -
References () http://www.securitytracker.com/id/1032625 - () http://www.securitytracker.com/id/1032625 -
References () http://www.ubuntu.com/usn/USN-2650-1 - () http://www.ubuntu.com/usn/USN-2650-1 -
References () https://security.gentoo.org/glsa/201606-17 - Third Party Advisory () https://security.gentoo.org/glsa/201606-17 - Third Party Advisory
References () https://support.apple.com/kb/HT213258 - () https://support.apple.com/kb/HT213258 -

17 May 2022, 07:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2022/May/34 -

16 May 2022, 20:15

Type Values Removed Values Added
References
  • (CONFIRM) https://support.apple.com/kb/HT213258 -

Information

Published : 2015-06-15 15:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-4142

Mitre link : CVE-2015-4142

CVE.ORG link : CVE-2015-4142


JSON object : View

Products Affected

w1.fi

  • wpa_supplicant
  • hostapd

redhat

  • enterprise_linux_desktop
  • enterprise_linux_hpc_node
  • enterprise_linux_workstation
  • enterprise_linux_server

opensuse

  • opensuse
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer