Vulnerability Name:

CVE-2005-0470 (CCN-19357)

Assigned:2005-02-16
Published:2005-02-16
Updated:2017-07-11
Summary:Buffer overflow in wpa_supplicant before 0.2.7 allows remote attackers to cause a denial of service (segmentation fault) via invalid EAPOL-Key packet data.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Bugzilla Bug 81993
net-wireless/wpa_supplicant buffer overflow

Source: MITRE
Type: CNA
CVE-2005-0470

Source: CCN
Type: wpa_supplicant Web page
Linux WPA/WPA2/IEEE 802.1X Supplicant

Source: CCN
Type: wpa_supplicant - new stable release document, Sun Feb 13 18:35:31 MST 2005
wpa_supplicant - new stable releases v0.3.8 and v0.2.7

Source: MLIST
Type: UNKNOWN
[HostAP] 20050213 wpa_supplicant - new stable releases v0.3.8 and v0.2.7

Source: CCN
Type: SA14313
wpa_supplicant EAPOL-Key Frames Buffer Overflow

Source: SECUNIA
Type: Patch, Vendor Advisory
14313

Source: CCN
Type: SECTRACK ID: 1013226
wpa_supplicant Key Data Length Missing Validation Lets Remote Users Crash the Service

Source: SECTRACK
Type: UNKNOWN
1013226

Source: CCN
Type: GLSA-200502-22
wpa_supplicant: Buffer overflow vulnerability

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200502-22

Source: CCN
Type: OSVDB ID: 13901
wpa_supplicant EAPOL-Key Frames Overflow

Source: CCN
Type: BID-12664
WPA_Supplicant Remote Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
wpasupplicant-bo(19357)

Source: XF
Type: UNKNOWN
wpasupplicant-bo(19357)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:wpa_supplicant:wpa_supplicant:0.2:*:*:*:*:*:*:*
  • OR cpe:/a:wpa_supplicant:wpa_supplicant:0.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:wpa_supplicant:wpa_supplicant:0.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:wpa_supplicant:wpa_supplicant:0.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:wpa_supplicant:wpa_supplicant:0.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:wpa_supplicant:wpa_supplicant:0.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:wpa_supplicant:wpa_supplicant:0.2.6:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    wpa_supplicant wpa supplicant 0.2
    wpa_supplicant wpa supplicant 0.2.1
    wpa_supplicant wpa supplicant 0.2.2
    wpa_supplicant wpa supplicant 0.2.3
    wpa_supplicant wpa supplicant 0.2.4
    wpa_supplicant wpa supplicant 0.2.5
    wpa_supplicant wpa supplicant 0.2.6
    gentoo linux *
    suse suse linux 9.2
    suse suse linux 9.2