Unrated severityNVD Advisory· Published Apr 28, 2015· Updated May 6, 2026
CVE-2015-1863
CVE-2015-1863
Description
Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
Affected products
20cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- lists.opensuse.org/opensuse-security-announce/2015-05/msg00000.htmlnvdThird Party Advisory
- packetstormsecurity.com/files/131598/Android-wpa_supplicant-Heap-Overflow.htmlnvdThird Party AdvisoryVDB Entry
- rhn.redhat.com/errata/RHSA-2015-1090.htmlnvdThird Party Advisory
- seclists.org/fulldisclosure/2015/Apr/82nvdThird Party AdvisoryVDB Entry
- w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txtnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3233nvdThird Party Advisory
- www.securitytracker.com/id/1032192nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2577-1nvdThird Party Advisory
- security.gentoo.org/glsa/201606-17nvdThird Party Advisory
- security.alibaba.com/blog/blog.htmnvd
- www.securityfocus.com/archive/1/535353/100/0/threadednvd
- www.securityfocus.com/bid/74296nvd
News mentions
0No linked articles in our index yet.