Buffer overflow in wpa_supplicant before 0.2.7 allows remote attackers to cause a denial of service (segmentation fault) via invalid EAPOL-Key packet data.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.shmoo.com/pipermail/hostap/2005-February/009465.html - | |
References | () http://secunia.com/advisories/14313 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1013226 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200502-22.xml - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19357 - |
Information
Published : 2005-03-14 05:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0470
Mitre link : CVE-2005-0470
CVE.ORG link : CVE-2005-0470
JSON object : View
Products Affected
wpa_supplicant
- wpa_supplicant
suse
- suse_linux
gentoo
- linux
CWE