Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200502-22] wpa_supplicant: Buffer overflow vulnerability


Vulnerability Assessment Details

[GLSA-200502-22] wpa_supplicant: Buffer overflow vulnerability

Vulnerability Assessment Summary
wpa_supplicant: Buffer overflow vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200502-22
(wpa_supplicant: Buffer overflow vulnerability)


wpa_supplicant contains a possible buffer overflow due to the
lacking validation of received EAPOL-Key frames.

Impact

A possible hacker could cause the crash of wpa_supplicant using a
specially crafted packet.

Workaround

There is no known workaround at this time.

References:
http://lists.shmoo.com/pipermail/hostap/2005-February/009465.html


Solution:
All wpa_supplicant users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-wireless/wpa_supplicant-0.2.7"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

Commodore 1541 Floppy Disk Drive- TESTED AND WORKS
$19.99
Commodore 1541 Floppy Disk Drive- TESTED AND WORKS  pictureAmiga 500 + Gotek 16 GB memory stick
$380.0
Amiga 500 + Gotek 16 GB memory stick pictureCommodore PET computer Model 2001-16N
$200.0
Commodore PET computer Model 2001-16N pictureRetro Commodore AMIGA 520 Video AV Adapter A500 TV Monitor Modulator Aux RF Out
$5.99
Retro Commodore AMIGA 520 Video AV Adapter A500 TV Monitor Modulator Aux RF Out picture


Discussions

No Discussions have been posted on this vulnerability.