Search CVE reports
41 – 50 of 59 results
CVE-2016-4477
Low prioritySome fixes available 11 of 15
wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
hostapd | — | — | Not in release | Not in release | Not in release |
wpa | — | — | Fixed | Fixed | Fixed |
wpasupplicant | — | — | Not in release | Not in release | Not in release |
CVE-2016-4476
Low prioritySome fixes available 11 of 15
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
hostapd | — | — | Not in release | Not in release | Not in release |
wpa | — | — | Fixed | Fixed | Fixed |
wpasupplicant | — | — | Not in release | Not in release | Not in release |
CVE-2015-5316
Medium priorityThe eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | — | — |
wpasupplicant | — | — | — | — | — |
CVE-2015-5315
Medium priorityThe eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile,...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | — | — |
wpasupplicant | — | — | — | — | — |
CVE-2015-5314
Medium priorityThe eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS...
2 affected packages
hostapd, wpa
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
hostapd | — | — | — | — | — |
wpa | — | — | — | — | — |
CVE-2015-5310
Medium priorityThe WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
wpa | — | — | — | — | — |
wpasupplicant | — | — | — | — | — |
CVE-2015-8041
Low prioritySome fixes available 1 of 2
Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
hostapd | — | — | — | — | Not in release |
wpa | — | — | — | — | Fixed |
wpasupplicant | — | — | — | — | Not in release |
CVE-2015-4146
Medium priorityThe EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
hostapd | — | — | — | — | — |
wpa | — | — | — | — | — |
wpasupplicant | — | — | — | — | — |
CVE-2015-4145
Medium priorityThe EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
hostapd | — | — | — | — | — |
wpa | — | — | — | — | — |
wpasupplicant | — | — | — | — | — |
CVE-2015-4144
Medium priorityThe EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
hostapd | — | — | — | — | — |
wpa | — | — | — | — | — |
wpasupplicant | — | — | — | — | — |