Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
hostapd和wpa_supplicant 缓冲区溢出漏洞
Vulnerability Description
hostapd是一个实现了无线接入点(AP)和认证服务器的守护进程。wpa_supplicant是软件开发者Jouni Malinen和其他贡献者共同开发的一个运行在后台的守护进程,它主要用来支持WEP、WPA/WPA2和WAPI无线协议和加密认证。 hostapd和wpa_supplicant 1.0版本至2.4版本的EAP-pwd服务器端和peer端实现过程中存在安全漏洞,该漏洞源于程序没有验证消息的长度是否大于Total-Length字段的长度。远程攻击者可借助特制的消息利用该漏洞造成拒绝服务(崩溃
CVSS Information
N/A
Vulnerability Type
N/A