Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-11555
HistoryApr 26, 2019 - 12:00 a.m.

CVE-2019-11555

2019-04-2600:00:00
ubuntu.com
ubuntu.com
7

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.016 Low

EPSS

Percentile

87.3%

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and
wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation
reassembly state properly for a case where an unexpected fragment could be
received. This could result in process termination due to a NULL pointer
dereference (denial of service). This affects eap_server/eap_server_pwd.c
and eap_peer/eap_pwd.c.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchwpa< 2:2.6-15ubuntu2.3UNKNOWN
ubuntu18.10noarchwpa< 2:2.6-18ubuntu1.2UNKNOWN
ubuntu19.04noarchwpa< 2:2.6-21ubuntu3.1UNKNOWN
ubuntu14.04noarchwpa< 2.1-0ubuntu1.7+esm1) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchwpa< 2.4-0ubuntu6.5UNKNOWN

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.016 Low

EPSS

Percentile

87.3%