HomeW1.FiCVE-2015-4146

CVE-2015-4146

UNKNOWN
5.0CVSS
Published: 2015-06-15
Updated: 2025-04-12
AI Analysis

Description

The EAP-pwd peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not clear the L (Length) and M (More) flags before determining if a response should be fragmented, which allows remote attackers to cause a denial of service (crash) via a crafted message.

CVSS Metrics

Vector
AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector
network
Access Cmplx
low
Auth
none
Confidentiality
none
Integrity
none
Availability
partial
Weaknesses
NVD-CWE-noinfo

Metadata

Primary Vendor
W1.FI
Published
6/15/2015
Last Modified
4/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

w1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : wpa_supplicantw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdw1.fi : hostapdopensuse : opensuseopensuse : opensuse

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2015-4146 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com