Lucene search

K
ubuntucveUbuntu.comUB:CVE-2015-5315
HistoryNov 10, 2015 - 12:00 a.m.

CVE-2015-5315

2015-11-1000:00:00
ubuntu.com
ubuntu.com
5

0.017 Low

EPSS

Percentile

87.6%

The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x
before 2.6 does not validate that the reassembly buffer is large enough for
the final fragment when EAP-pwd is enabled in a network configuration
profile, which allows remote attackers to cause a denial of service
(process termination) via a large final fragment in an EAP-pwd message.

OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchwpa< 2.1-0ubuntu1.4UNKNOWN
ubuntu15.04noarchwpa< 2.1-0ubuntu7.3UNKNOWN
ubuntu15.10noarchwpa< 2.4-0ubuntu3.2UNKNOWN

0.017 Low

EPSS

Percentile

87.6%