CVE-2012-4445
Published Oct 10, 2012
Last updated 2 years ago
Overview
- Description
- Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "816B50F2-87B8-4A74-80CA-6DE23A61AA9D" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E4EC748-0E3D-4A70-9B30-0B0048637222" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA68E996-A9DA-4D58-AA05-B4F9CFD8FF78" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "625BF95C-F216-4853-B62F-4A220427E1B4" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EE7C5C4-AF37-4DE1-B240-5B35BB547505" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8C75878-75FC-4792-BF93-6E6758BCFC94" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA1BC3E9-5AA2-466E-AAE0-4FB5EDF85860" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6475E94F-F457-4053-8B1B-F44D42742271" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A01092A1-8D52-4474-BC85-663BCA683208" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B79614B8-BEEC-4772-944B-F631D85A278D" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C5CBC86-4F65-4A1E-8423-D599B8F89EE6" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06119A43-B1CA-4021-87D2-C67BE6125423" }, { "criteria": "cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "768D16AF-3A8B-47DD-A499-948A73062AE1" } ], "operator": "OR" } ] } ]