cve/2015/CVE-2015-5315.md

18 lines
815 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-5315](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5315)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
### POC
#### Reference
- http://www.ubuntu.com/usn/USN-2808-1
#### Github
No PoCs found on GitHub currently.