CVE-2015-5316
Published: 10 November 2015
The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an EAP-pwd Confirm message followed by the Identity exchange.
Notes
Author | Note |
---|---|
mdeslaur | looks like it was introduced by 1f1fe195cd8907badca6d4ee17e5fa638b6f83db, so only wily+ |
Priority
CVSS 3 base score: 5.9
Status
Package | Release | Status |
---|---|---|
wpa Launchpad, Ubuntu, Debian |
precise |
Does not exist
|
trusty |
Not vulnerable
(code not vulnerable)
|
|
upstream |
Needs triage
|
|
vivid |
Not vulnerable
(code not vulnerable)
|
|
wily |
Released
(2.4-0ubuntu3.2)
|
|
wpasupplicant Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
(code not vulnerable)
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|