Published on April 29th, 2019 📆 | 1716 Views ⚑0
hostapd/wpa_supplicant up to 2.7 EAP-pwd eap_server_pwd.c denial of service
|CVSS Meta Temp Score||Current Exploit Price (≈)|
A vulnerability was found in hostapd and wpa_supplicant up to 2.7. It has been declared as problematic. Affected by this vulnerability is a code block of the file eap_server/eap_server_pwd.c of the component EAP-pwd. The manipulation with an unknown input leads to a denial of service vulnerability (NULL Pointer Dereference). The CWE definition for the vulnerability is CWE-476. As an impact it is known to affect availability.
The weakness was presented 04/26/2019 (oss-sec). It is possible to read the advisory at openwall.com. This vulnerability is known as CVE-2019-11555 since 04/26/2019. Technical details of the vulnerability are known, but there is no available exploit.
Upgrading to version 2.8 eliminates this vulnerability.
VulDB Meta Base Score: 3.5
VulDB Meta Temp Score: 3.4
Status: Not defined
Price Prediction: ?
Current Price Estimation: ?
0-Day unlock unlock unlock unlock Today unlock unlock unlock unlock
Upgrade: hostapd/wpa_supplicant 2.8
Created: 04/27/2019 08:40 AM Use the official API to access entries easily!
Use the official API to access entries easily!