CVE-2012-4445
Published: 10 October 2012
Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.
Priority
Status
Package | Release | Status |
---|---|---|
hostapd Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Patches: Vendor: http://www.debian.org/security/2012/dsa-2557 Other: http://people.debian.org/~nion/nmu-diff/hostapd-0.6.10-2_0.6.10-2+squeeze1.patch Upstream: http://w1.fi/gitweb/gitweb.cgi?p=hostap.git;a=commitdiff;h=586c446e0ff42ae00315b014924ec669023bd8de |
||
wpa Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.0-3)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(1.0-3ubuntu1)
|
|
Binaries built from this source package are in Universe and so are supported by the community. |