Upstream information

CVE-2015-5314 at MITRE

Description

The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS server and EAP-pwd is enabled in a runtime configuration, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 953115 [RESOLVED / INVALID]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 42.2
  • hostapd >= 2.6-5.3.1
  • hostapd-debuginfo >= 2.6-5.3.1
  • hostapd-debugsource >= 2.6-5.3.1
Patchnames:
openSUSE-2017-1201
openSUSE Leap 42.3
  • hostapd >= 2.6-8.1
  • hostapd-debuginfo >= 2.6-8.1
  • hostapd-debugsource >= 2.6-8.1
Patchnames:
openSUSE-2017-1201
openSUSE Tumbleweed
  • hostapd >= 2.6-1.1
Patchnames:
openSUSE Tumbleweed GA hostapd