Search CVE reports
11 – 20 of 24 results
The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile,...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
hostapd | — | — | — | — |
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
hostapd | — | — | — | — |
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
hostapd | — | — | — | — |
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
hostapd | — | — | — | — |
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
Some fixes available 8 of 9
Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
hostapd | — | — | — | — |
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
Some fixes available 7 of 8
The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which...
3 affected packages
hostapd, wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
hostapd | — | — | — | — |
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |
Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when...
2 affected packages
wpa, wpasupplicant
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
wpa | — | — | — | — |
wpasupplicant | — | — | — | — |