HomeCanonicalCVE-2015-1863

CVE-2015-1863

UNKNOWN
5.8CVSS
Published: 2015-04-28
Updated: 2025-04-12
AI Analysis

Description

Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.

CVSS Metrics

Vector
AV:A/AC:L/Au:N/C:P/I:P/A:P
Access Vector
adjacent network
Access Cmplx
low
Auth
none
Confidentiality
partial
Integrity
partial
Availability
partial
Weaknesses
CWE-119

Metadata

Primary Vendor
CANONICAL
Published
4/28/2015
Last Modified
4/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

canonical : ubuntu_linuxcanonical : ubuntu_linuxcanonical : ubuntu_linuxw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantredhat : enterprise_linux_desktopredhat : enterprise_linux_hpc_noderedhat : enterprise_linux_hpc_node_eusredhat : enterprise_linux_serverredhat : enterprise_linux_server_eusredhat : enterprise_linux_workstationdebian : debian_linuxdebian : debian_linuxopensuse : opensuseopensuse : opensuse

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2015-1863 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com