VYPR
Unrated severityNVD Advisory· Published Jun 15, 2015· Updated May 6, 2026

CVE-2015-4145

CVE-2015-4145

Description

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.

Affected products

16
  • W1.fi/Hostapd7 versions
    cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*+ 6 more
    • cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*+ 6 more
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*
  • OpenSUSE/openSUSE2 versions
    cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
    • cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.