Denial of service in hostapd

Posted: November 24, 2012 in Uncategorized
Tags: , , ,

Vulnerability

Denial of service in hostapd

Vulnerability: Denial of service in hostapd

Danger: Low
Availability of fixes: Instructions to fixe
Number of vulnerabilities: 1

CVE ID: CVE-2012-4445
Vector operation: Local Network
Impact: Denial of service

Affected products: Hostapd 0.x, hostapd 1.x

Affected versions: hostapd 0.6, perhaps the only one.
hostapd 1.0, perhaps the only one.

Description:

The vulnerability can be exploited to cause a DoS attack.

The vulnerability is caused due to a boundary error in the function “eap_server_tls_process_fragment ()” in the file eap_server / eap_server_tls_common.c handling data in TLS-messages. This can be exploited via a specially crafted EAP-TLS messages cause a buffer overflow and crash the service.

Note: Successful exploitation requires that hostapd is configured to use an internal authentication server EAP.

Manufacturer URL: http://hostap.epitest.fi/hostapd/

Solution: To resolve the vulnerability, follow the manufacturer’s instructions.

links:

http://www.pre-cert.de/advisories/PRE-SA-2012-07.txt

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s