Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
hostapd和wpa_supplicant 资源管理错误漏洞
Vulnerability Description
hostapd是一个实现了无线接入点(AP)和认证服务器的守护进程。wpa_supplicant是软件开发者Jouni Malinen和其他贡献者共同开发的一个运行在后台的守护进程,它主要用来支持WEP、WPA/WPA2和WAPI无线协议和加密认证。 hostapd和wpa_supplicant 1.0版本至2.4版本的EAP-pwd服务器端和peer端实现过程中存在安全漏洞,该漏洞源于程序没有验证片段是否已经处理。远程攻击者可借助特制的消息利用该漏洞造成拒绝服务(内存泄露)。
CVSS Information
N/A
Vulnerability Type
N/A