Denial of service in hostapd

Posted: November 24, 2012 in Uncategorized
Tags: , , ,


Denial of service in hostapd

Vulnerability: Denial of service in hostapd

Danger: Low
Availability of fixes: Instructions to fixe
Number of vulnerabilities: 1

CVE ID: CVE-2012-4445
Vector operation: Local Network
Impact: Denial of service

Affected products: Hostapd 0.x, hostapd 1.x

Affected versions: hostapd 0.6, perhaps the only one.
hostapd 1.0, perhaps the only one.


The vulnerability can be exploited to cause a DoS attack.

The vulnerability is caused due to a boundary error in the function “eap_server_tls_process_fragment ()” in the file eap_server / eap_server_tls_common.c handling data in TLS-messages. This can be exploited via a specially crafted EAP-TLS messages cause a buffer overflow and crash the service.

Note: Successful exploitation requires that hostapd is configured to use an internal authentication server EAP.

Manufacturer URL:

Solution: To resolve the vulnerability, follow the manufacturer’s instructions.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s