CVE-2019-11555

Related Vulnerabilities: CVE-2019-11555  

Impact: Moderate Public Date: 2019-04-18 CWE: CWE-476 Bugzilla: 1703417: wpa_supplicant: Improper fragmentation reassembly state validation in EAP peer leading to DoS The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

The MITRE CVE dictionary describes this issue as:

The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.

Find out more about CVE-2019-11555 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 5.3
CVSS3 Base Metrics CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Adjacent Network
Attack Complexity High
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 8 wpa_supplicant Under investigation
Red Hat Enterprise Linux 7 wpa_supplicant Under investigation
Red Hat Enterprise Linux 6 wpa_supplicant Under investigation
Red Hat Enterprise Linux 5 wpa_supplicant Under investigation