Heap-based buffer overflow in wpa_supplicant (Alpine package)



Published: 2015-05-19
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2015-1863
CWE-ID CWE-122
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
wpa_supplicant (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Heap-based buffer overflow

EUVDB-ID: #VU32294

Risk: Medium

CVSSv3.1: 5.5 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-1863

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4. A remote attacker can use crafted SSID information in a management frame when creating or updating P2P entries. to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

wpa_supplicant (Alpine package): 2.0-r0 - 2.0-r1

External links

http://git.alpinelinux.org/aports/commit/?id=3aeb57ec96caa3b0c85bc950e5fd36f43bcd48fe
http://git.alpinelinux.org/aports/commit/?id=fe93077fc235073200c471a387c27261bfc20eb7
http://git.alpinelinux.org/aports/commit/?id=8eeb852f99efdce027c392ad0ab29bb684f0ed7d
http://git.alpinelinux.org/aports/commit/?id=23b5bada7760b28f341d923d4549f36b4d9dc50b
http://git.alpinelinux.org/aports/commit/?id=24fe5565c27eed276c793d7e34bdad182efee108
http://git.alpinelinux.org/aports/commit/?id=2b5198b441b22d8c68cd7131be7c5c0bff746a91
http://git.alpinelinux.org/aports/commit/?id=d8639f35f2edbddd0d541d199154f7c5bd5230ee
http://git.alpinelinux.org/aports/commit/?id=fd324ccbd51905c0571336037f4b4a09b8480170
http://git.alpinelinux.org/aports/commit/?id=8a7f64e70c1e5c6217b9fd22398aa1bd7cb78e66
http://git.alpinelinux.org/aports/commit/?id=91b54682eaeaebac4ff3820542d2ee7dd484bc01
http://git.alpinelinux.org/aports/commit/?id=b92df58cbcca0791c5a3e471e29bed3b5746a44f
http://git.alpinelinux.org/aports/commit/?id=f884e336d5348fdbdb34376627fb5f949dfc00e4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###