Heap-based buffer overflow in wpa_supplicant 1.0 up to and including 2.4 allows remote malicious users to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
canonical ubuntu linux 15.04 |
||
canonical ubuntu linux 14.04 |
||
canonical ubuntu linux 14.10 |
||
w1.fi wpa supplicant 2.2 |
||
w1.fi wpa supplicant 2.3 |
||
w1.fi wpa supplicant 2.0 |
||
w1.fi wpa supplicant 2.1 |
||
w1.fi wpa supplicant 2.4 |
||
w1.fi wpa supplicant 1.0 |
||
w1.fi wpa supplicant 1.1 |
||
redhat enterprise linux hpc node eus 7.1 |
||
redhat enterprise linux server eus 7.1 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux hpc node 7.0 |
||
debian debian linux 7.0 |
||
debian debian linux 8.0 |
||
opensuse opensuse 13.1 |
||
opensuse opensuse 13.2 |