CVE-2015-4141

Published: 01 June 2015

The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.

Priority

Medium

Status

Package Release Status
hostapd
Launchpad, Ubuntu, Debian
Upstream Pending
(2.5)
Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist
(precise was needed)
Patches:
Other: http://w1.fi/security/2015-2/0001-WPS-Fix-HTTP-chunked-transfer-encoding-parser.patch
wpa
Launchpad, Ubuntu, Debian
Upstream Pending
(2.5)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2.1-0ubuntu8)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.1-0ubuntu1.3)
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Other: http://w1.fi/security/2015-2/0001-WPS-Fix-HTTP-chunked-transfer-encoding-parser.patch
wpasupplicant
Launchpad, Ubuntu, Debian
Upstream Pending
(2.5)
Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Not vulnerable
(code not built)
Patches:
Other: http://w1.fi/security/2015-2/0001-WPS-Fix-HTTP-chunked-transfer-encoding-parser.patch