Vulnerability: Denial of service in hostapd
Availability of fixes: Instructions to fixe
Number of vulnerabilities: 1
CVE ID: CVE-2012-4445
Vector operation: Local Network
Impact: Denial of service
Affected products: Hostapd 0.x, hostapd 1.x
Affected versions: hostapd 0.6, perhaps the only one.
hostapd 1.0, perhaps the only one.
The vulnerability can be exploited to cause a DoS attack.
The vulnerability is caused due to a boundary error in the function “eap_server_tls_process_fragment ()” in the file eap_server / eap_server_tls_common.c handling data in TLS-messages. This can be exploited via a specially crafted EAP-TLS messages cause a buffer overflow and crash the service.
Note: Successful exploitation requires that hostapd is configured to use an internal authentication server EAP.
Manufacturer URL: http://hostap.epitest.fi/hostapd/
Solution: To resolve the vulnerability, follow the manufacturer’s instructions.