EAP-pwd implementation does not validate fragments, leading to remote memory lea
Reporter | Title | Published | Views | Family All 26 |
---|---|---|---|---|
![]() | CVE-2015-4145 | 15 Jun 201515:00 | – | cvelist |
![]() | Memory corruption | 15 Jun 201515:59 | – | prion |
![]() | CVE-2015-4145 | 15 Jun 201515:59 | – | nvd |
![]() | CVE-2015-4145 | 1 Jun 201500:00 | – | ubuntucve |
![]() | CVE-2015-4145 | 15 Jun 201515:59 | – | cve |
![]() | hostapd: denial of service | 5 Oct 201500:00 | – | archlinux |
![]() | hostapd and wpa_supplicant -- multiple vulnerabilities | 4 May 201500:00 | – | freebsd |
![]() | [USN-2650-1] wpa_supplicant and hostapd vulnerabilities | 21 Jun 201500:00 | – | securityvulns |
![]() | wpa_supplicant multiple security vulnerabilities | 21 Jun 201500:00 | – | securityvulns |
![]() | wpa_supplicant and hostapd vulnerabilities | 16 Jun 201500:00 | – | ubuntu |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wpa | 2.3-2.2 | wpa_2.3-2.2_all.deb |
Debian | 11 | all | wpa | 2.3-2.2 | wpa_2.3-2.2_all.deb |
Debian | 999 | all | wpa | 2.3-2.2 | wpa_2.3-2.2_all.deb |
Debian | 13 | all | wpa | 2.3-2.2 | wpa_2.3-2.2_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo