Summary: | <net-wireless/hostapd-1.0-r4 : EAP-TLS Message Handling Denial of Service Vulnerability (CVE-2012-4445) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | gurligebis, zerochaos |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/50888/ | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2012-10-10 12:27:07 UTC
Patch included in hostapd-1.0-r4 - the rest is up to you :-) (In reply to comment #1) > Patch included in hostapd-1.0-r4 - the rest is up to you :-) Thanks. Arches, please test and mark stable: =net-wireless/hostapd-1.0-r4 Target KEYWORDS: "amd64 ppc x86" Once marked stable, please remove every other version than 1.0-r4. Thanks x86 done amd64 stable stable ppc (In reply to comment #3) > Once marked stable, please remove every other version than 1.0-r4. > > Thanks Cleanup done, security please vote. CVE-2012-4445 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4445): Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set. Vote: no. GLSA vote: no. Closing noglsa. |