Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2015-5316

Published: 10 November 2015

The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an EAP-pwd Confirm message followed by the Identity exchange.

Notes

AuthorNote
mdeslaur
looks like it was introduced by
1f1fe195cd8907badca6d4ee17e5fa638b6f83db, so only wily+

Priority

Medium

CVSS 3 base score: 5.9

Status

Package Release Status
wpa
Launchpad, Ubuntu, Debian
precise Does not exist

trusty Not vulnerable
(code not vulnerable)
upstream Needs triage

vivid Not vulnerable
(code not vulnerable)
wily
Released (2.4-0ubuntu3.2)
wpasupplicant
Launchpad, Ubuntu, Debian
precise Not vulnerable
(code not vulnerable)
trusty Does not exist

upstream Needs triage

vivid Does not exist

wily Does not exist