Unrated severityNVD Advisory· Published Jun 15, 2015· Updated May 6, 2026
CVE-2015-4143
CVE-2015-4143
Description
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
Affected products
16cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- lists.opensuse.org/opensuse-updates/2015-06/msg00019.htmlnvdThird Party Advisory
- w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txtnvdVendor Advisory
- security.gentoo.org/glsa/201606-17nvdThird Party Advisory
- www.debian.org/security/2015/dsa-3397nvd
- www.openwall.com/lists/oss-security/2015/05/09/6nvd
- www.openwall.com/lists/oss-security/2015/05/31/6nvd
- www.ubuntu.com/usn/USN-2650-1nvd
News mentions
0No linked articles in our index yet.