New vulnerability on the NVD: CVE-2015-5315

The eap_pwd_process function in eap_peer/eap_pwd.c in wpa_supplicant 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when EAP-pwd is enabled in a network configuration profile, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.

Published at: February 21, 2018 at 09:29PM

Comments

Popular posts from this blog

Detours for Bus Routes 23 and 103 on Saturday, Sept. 3 and Detours for Bus Routes 22, 200, 202, 203, 224, 238, 250 and 251 on Monday, Sept. 5

DART Announces 2022 Labor Day Schedule

DART Announces Changes to Bus and GoLink Services Beginning Monday, September 26