The implementations of EAP-PWD in wpasupplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpasupplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "hostapd-dbgsym": "1:2.1-0ubuntu1.7", "wpasupplicant-udeb": "2.1-0ubuntu1.7", "wpagui-dbgsym": "2.1-0ubuntu1.7", "hostapd": "1:2.1-0ubuntu1.7", "wpagui": "2.1-0ubuntu1.7", "wpasupplicant": "2.1-0ubuntu1.7", "wpasupplicant-udeb-dbgsym": "2.1-0ubuntu1.7", "wpasupplicant-dbgsym": "2.1-0ubuntu1.7" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "hostapd-dbgsym": "1:2.4-0ubuntu6.4", "wpasupplicant-udeb": "2.4-0ubuntu6.4", "wpagui-dbgsym": "2.4-0ubuntu6.4", "hostapd": "1:2.4-0ubuntu6.4", "wpagui": "2.4-0ubuntu6.4", "wpasupplicant": "2.4-0ubuntu6.4", "wpasupplicant-udeb-dbgsym": "2.4-0ubuntu6.4", "wpasupplicant-dbgsym": "2.4-0ubuntu6.4" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "hostapd-dbgsym": "2:2.6-15ubuntu2.2", "wpasupplicant-udeb": "2:2.6-15ubuntu2.2", "wpagui-dbgsym": "2:2.6-15ubuntu2.2", "hostapd": "2:2.6-15ubuntu2.2", "wpagui": "2:2.6-15ubuntu2.2", "wpasupplicant": "2:2.6-15ubuntu2.2", "wpasupplicant-dbgsym": "2:2.6-15ubuntu2.2" } ] }