CVE-2012-4445

Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
w1.fihostapd
0.6.0
w1.fihostapd
0.6.1
w1.fihostapd
0.6.2
w1.fihostapd
0.6.3
w1.fihostapd
0.6.4
w1.fihostapd
0.6.5
w1.fihostapd
0.6.6
w1.fihostapd
0.6.7
w1.fihostapd
0.7.0
w1.fihostapd
0.7.1
w1.fihostapd
0.7.2
w1.fihostapd
0.7.3
w1.fihostapd
1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
wpa
bookworm
2:2.10-12+deb12u2
fixed
bookworm (security)
2:2.10-12+deb12u2
fixed
bullseye
2:2.9.0-21+deb11u2
fixed
bullseye (security)
2:2.9.0-21+deb11u2
fixed
sid
2:2.10-22
fixed
trixie
2:2.10-22
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
hostapd
hardy
ignored
lucid
ignored
natty
Fixed 0.6.10-2+squeeze1build0.11.04.1
released
oneiric
ignored
precise
Fixed 1:0.7.3-4ubuntu1.1
released
quantal
dne
raring
dne
saucy
dne
trusty
dne
wpa
hardy
dne
lucid
dne
natty
dne
oneiric
dne
precise
dne
quantal
ignored
raring
not-affected
saucy
not-affected
trusty
not-affected