CVE-2005-0470

Current Description

Buffer overflow in wpa_supplicant before 0.2.7 allows remote attackers to cause a denial of service (segmentation fault) via invalid EAPOL-Key packet data.

Basic Data

PublishedMarch 14, 2005
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationWpa SupplicantWpa Supplicant0.2*******
    2.3ApplicationWpa SupplicantWpa Supplicant0.2.1*******
    2.3ApplicationWpa SupplicantWpa Supplicant0.2.2*******
    2.3ApplicationWpa SupplicantWpa Supplicant0.2.3*******
    2.3ApplicationWpa SupplicantWpa Supplicant0.2.4*******
    2.3ApplicationWpa SupplicantWpa Supplicant0.2.5*******
    2.3ApplicationWpa SupplicantWpa Supplicant0.2.6*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSGentooLinux********
    2.3OSSuseSuse Linux9.2*******
    2.3OSSuseSuse Linux9.2*x86_64*****

Vulnerable Software List

VendorProductVersions
Wpa Supplicant Wpa Supplicant 0.2, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5, 0.2.6
Suse Suse Linux 9.2
Gentoo Linux *

References

NameSourceURLTags
[HostAP] 20050213 wpa_supplicant - new stable releases v0.3.8 and v0.2.7http://lists.shmoo.com/pipermail/hostap/2005-February/009465.htmlMLIST
14313http://secunia.com/advisories/14313SECUNIAPatch Vendor Advisory
1013226http://securitytracker.com/id?1013226SECTRACK
GLSA-200502-22http://www.gentoo.org/security/en/glsa/glsa-200502-22.xmlGENTOOPatch Vendor Advisory
wpasupplicant-bo(19357)https://exchange.xforce.ibmcloud.com/vulnerabilities/19357XF