Vulnerabilities > CVE-2005-0470
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in wpa_supplicant before 0.2.7 allows remote attackers to cause a denial of service (segmentation fault) via invalid EAPOL-Key packet data.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 | |
OS | 2 | |
OS | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200502-22.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200502-22 (wpa_supplicant: Buffer overflow vulnerability) wpa_supplicant contains a possible buffer overflow due to the lacking validation of received EAPOL-Key frames. Impact : An attacker could cause the crash of wpa_supplicant using a specially crafted packet. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17127 |
published | 2005-02-16 |
reporter | This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/17127 |
title | GLSA-200502-22 : wpa_supplicant: Buffer overflow vulnerability |
code |
|
References
- http://lists.shmoo.com/pipermail/hostap/2005-February/009465.html
- http://lists.shmoo.com/pipermail/hostap/2005-February/009465.html
- http://secunia.com/advisories/14313
- http://secunia.com/advisories/14313
- http://securitytracker.com/id?1013226
- http://securitytracker.com/id?1013226
- http://www.gentoo.org/security/en/glsa/glsa-200502-22.xml
- http://www.gentoo.org/security/en/glsa/glsa-200502-22.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19357
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19357