CVE-2012-4445

Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 89%
VendorProductVersion
w1.fihostapd
0.6.0
w1.fihostapd
0.6.1
w1.fihostapd
0.6.2
w1.fihostapd
0.6.3
w1.fihostapd
0.6.4
w1.fihostapd
0.6.5
w1.fihostapd
0.6.6
w1.fihostapd
0.6.7
w1.fihostapd
0.7.0
w1.fihostapd
0.7.1
w1.fihostapd
0.7.2
w1.fihostapd
0.7.3
w1.fihostapd
1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wpa
bullseye (security)
2:2.9.0-21+deb11u2
fixed
bullseye
2:2.9.0-21+deb11u2
fixed
bookworm
2:2.10-12+deb12u2
fixed
bookworm (security)
2:2.10-12+deb12u2
fixed
sid
2:2.10-22
fixed
trixie
2:2.10-22
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
hostapd
trusty
dne
saucy
dne
raring
dne
quantal
dne
precise
Fixed 1:0.7.3-4ubuntu1.1
released
oneiric
ignored
natty
Fixed 0.6.10-2+squeeze1build0.11.04.1
released
lucid
ignored
hardy
ignored
wpa
trusty
not-affected
saucy
not-affected
raring
not-affected
quantal
ignored
precise
dne
oneiric
dne
natty
dne
lucid
dne
hardy
dne