Computer Security
[EN] securityvulns.ru no-pyccku


hostapd buffer overflow
Published:10.10.2012
Source:
SecurityVulns ID:12638
Type:remote
Threat Level:
5/10
Description:Buffer overflow during EAP authentication.
Affected:HOSTAPD : hostapd 1.0
CVE:CVE-2012-4445 (Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.)
Original documentdocumentTimo Warns, [PRE-SA-2012-07] hostapd: Missing EAP-TLS message length validation (10.10.2012)
 documentDEBIAN, [SECURITY] [DSA 2557-1] hostapd security update (10.10.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod