4.3
CVSSv2

CVE-2012-4445

Published: 10/10/2012 Updated: 13/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 up to and including 1.0 allows remote malicious users to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.

Vulnerable Product Search on Vulmon Subscribe to Product

w1.fi hostapd 0.6.2

w1.fi hostapd 0.6.1

w1.fi hostapd 0.7.3

w1.fi hostapd 1.0

w1.fi hostapd 0.6.0

w1.fi hostapd 0.7.0

w1.fi hostapd 0.6.6

w1.fi hostapd 0.6.3

w1.fi hostapd 0.7.2

w1.fi hostapd 0.6.7

w1.fi hostapd 0.6.4

w1.fi hostapd 0.7.1

w1.fi hostapd 0.6.5

Vendor Advisories

Debian Bug report logs - #689990 hostapd: CVE-2012-4445 denial of service Package: wpa; Maintainer for wpa is Debian wpasupplicant Maintainers <wpa@packagesdebianorg>; Reported by: Nico Golde <nion@debianorg> Date: Mon, 8 Oct 2012 19:57:02 UTC Severity: grave Tags: patch, security Fixed in version wpa/10-3 Don ...