HomeOpensuseCVE-2015-4144

CVE-2015-4144

UNKNOWN
5.0CVSS
Published: 2015-06-15
Updated: 2025-04-12
AI Analysis

Description

The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.

CVSS Metrics

Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector
network
Access Cmplx
low
Auth
none
Confidentiality
none
Integrity
none
Availability
partial
Weaknesses
CWE-119

Metadata

Primary Vendor
OPENSUSE
Published
6/15/2015
Last Modified
4/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

opensuse : opensuseopensuse : opensusew1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicant

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2015-4144 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com