Denial of Service (DoS) Affecting hostapd package, versions [,2.5)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
2.69% (91st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-HOSTAPD-2319508
  • published14 Dec 2021
  • disclosed9 Nov 2015
  • creditUnknown

Introduced: 9 Nov 2015

CVE-2015-8041  (opens in a new tab)
CWE-189  (opens in a new tab)

How to fix?

Upgrade hostapd to version 2.5 or higher.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). Multiple integer overflows in the NDEF record parser in hostapd before 2.5 and wpa_supplicant before 2.5 allow remote attackers to cause a denial of service (process crash or infinite loop) via a large payload length field value in an (1) WPS or (2) P2P NFC NDEF record, which triggers an out-of-bounds read.

CVSS Scores

version 3.1