The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2019/04/26/1 - Mailing List, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/07/msg00030.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5T7G763UECWR7FQXOJVL67PW7C5A3SA4/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DJKZHAT5KPUN26JL77EUH563GAH5XZ5C/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQ6P2GI5GSXRNLNIUNPARFZQVDEIGVZD/ - | |
References | () https://seclists.org/bugtraq/2019/May/40 - | |
References | () https://seclists.org/bugtraq/2019/May/64 - | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-19:03.wpa.asc - | |
References | () https://security.gentoo.org/glsa/201908-25 - | |
References | () https://usn.ubuntu.com/3969-1/ - | |
References | () https://usn.ubuntu.com/3969-2/ - | |
References | () https://w1.fi/security/2019-5/ - Patch, Vendor Advisory | |
References | () https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt - Vendor Advisory | |
References | () https://www.debian.org/security/2019/dsa-4450 - | |
References | () https://www.openwall.com/lists/oss-security/2019/04/18/6 - Mailing List, Patch, Third Party Advisory |
07 Nov 2023, 03:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-04-26 22:29
Updated : 2024-11-21 04:21
NVD link : CVE-2019-11555
Mitre link : CVE-2019-11555
CVE.ORG link : CVE-2019-11555
JSON object : View
Products Affected
w1.fi
- hostapd
- wpa_supplicant
CWE
CWE-476
NULL Pointer Dereference