CVE-2015-8041

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.

References

http://lists.opensuse.org/opensuse-updates/2015-11/msg00037.html

http://lists.opensuse.org/opensuse-updates/2015-11/msg00041.html

http://w1.fi/security/2015-5/incomplete-wps-and-p2p-nfc-ndef-record-payload-length-validation.txt

http://www.debian.org/security/2015/dsa-3397

http://www.openwall.com/lists/oss-security/2015/11/02/5

http://www.securityfocus.com/bid/75604

https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog

https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog

Details

Source: MITRE

Published: 2015-11-09

Updated: 2018-10-30

Type: CWE-189

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:w1.fi:wpa_supplicant:*:*:*:*:*:*:*:* versions up to 2.4 (inclusive)

Configuration 2

OR

cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* versions up to 2.4 (inclusive)

Tenable Plugins

View all (8 total)

IDNameProductFamilySeverity
143704SUSE SLES12 Security Update : wpa_supplicant (SUSE-SU-2020:3424-1) (KRACK)NessusSuSE Local Security Checks
high
143627SUSE SLED15 / SLES15 Security Update : wpa_supplicant (SUSE-SU-2020:3380-1) (KRACK)NessusSuSE Local Security Checks
high
143321openSUSE Security Update : wpa_supplicant (openSUSE-2020-2053) (KRACK)NessusSuSE Local Security Checks
high
143304openSUSE Security Update : wpa_supplicant (openSUSE-2020-2059) (KRACK)NessusSuSE Local Security Checks
high
93700openSUSE Security Update : wpa_supplicant (openSUSE-2016-1104)NessusSuSE Local Security Checks
medium
93507SUSE SLED12 / SLES12 Security Update : wpa_supplicant (SUSE-SU-2016:2305-1)NessusSuSE Local Security Checks
medium
86833Debian DSA-3397-1 : wpa - security updateNessusDebian Local Security Checks
medium
84653FreeBSD : wpa_supplicant -- WPS_NFC option payload length validation vulnerability (c93c9395-25e1-11e5-a4a5-002590263bf5)NessusFreeBSD Local Security Checks
medium