Search CVE reports


Toggle filters

41 – 50 of 59 results


CVE-2016-10743

Low priority
Fixed

hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.

1 affected package

wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa Not affected
Show less packages

CVE-2015-8041

Low priority

Some fixes available 1 of 2

Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value...

3 affected packages

hostapd, wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
hostapd
wpa
wpasupplicant
Show less packages

CVE-2015-5316

Medium priority
Fixed

The eap_pwd_perform_confirm_exchange function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6, when EAP-pwd is enabled in a network configuration profile, allows remote attackers to cause a denial of service (NULL pointer...

2 affected packages

wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa
wpasupplicant
Show less packages

CVE-2015-5315

Medium priority
Fixed

The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile,...

2 affected packages

wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa
wpasupplicant
Show less packages

CVE-2015-5314

Medium priority
Fixed

The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS...

2 affected packages

hostapd, wpa

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
hostapd
wpa
Show less packages

CVE-2015-5310

Medium priority
Fixed

The WNM Sleep Mode code in wpa_supplicant 2.x before 2.6 does not properly ignore key data in response frames when management frame protection (MFP) was not negotiated, which allows remote attackers to inject arbitrary broadcast...

2 affected packages

wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
wpa
wpasupplicant
Show less packages

CVE-2015-4146

Medium priority
Fixed

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial...

3 affected packages

hostapd, wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
hostapd
wpa
wpasupplicant
Show less packages

CVE-2015-4145

Medium priority
Fixed

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a...

3 affected packages

hostapd, wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
hostapd
wpa
wpasupplicant
Show less packages

CVE-2015-4144

Medium priority
Fixed

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service...

3 affected packages

hostapd, wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
hostapd
wpa
wpasupplicant
Show less packages

CVE-2015-4143

Medium priority
Fixed

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.

3 affected packages

hostapd, wpa, wpasupplicant

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
hostapd
wpa
wpasupplicant
Show less packages