Computer Security
[EN] securityvulns.ru no-pyccku


hostapd security vulnerabilities
Published:28.10.2012
Source:
SecurityVulns ID:12670
Type:remote
Threat Level:
5/10
Description:Buffer overflow, weak permissions.
Affected:HOSTAPD : hostapd 0.7
CVE:CVE-2012-4445 (Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.)
 CVE-2012-2389 (hostapd 0.7.3, and possibly other versions before 1.0, uses 0644 permissions for /etc/hostapd/hostapd.conf, which might allow local users to obtain sensitive information such as credentials.)
Original documentdocumentMANDRIVA, [ MDVSA-2012:168 ] hostapd (28.10.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod