#VU33633 Heap-based buffer overflow in SUSE products - CVE-2015-4141
Published: June 15, 2015 / Updated: August 4, 2020
wpa_supplicant
hostapd
Opensuse
Jouni Malinen
SUSE
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4. A remote attacker can use a negative chunk length to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00019.html
- http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt
- http://www.debian.org/security/2015/dsa-3397
- http://www.openwall.com/lists/oss-security/2015/05/09/4
- http://www.openwall.com/lists/oss-security/2015/05/31/6
- http://www.ubuntu.com/usn/USN-2650-1
- https://security.gentoo.org/glsa/201606-17