Heap-based buffer overflow in Aconf



Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2012-4445
CWE-ID CWE-122
Exploitation vector Network
Public exploit N/A
Vulnerable software
hostapd (Alpine package)
Operating systems & Components / Operating system package or component


Other

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Heap-based buffer overflow

EUVDB-ID: #VU32434

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2012-4445

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0. A remote attacker can use a small to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

hostapd (Alpine package): 0.7.3-r1 - 2.9-r0

: 0.4.0-r1

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=7d85eb1a12890ce66101c9292c1aa5a8d447c0b3
https://git.alpinelinux.org/aports/commit/?id=f1fd2a573425793de610a615092f210f1c50f0ad
https://git.alpinelinux.org/aports/commit/?id=031621e2cf39f9441cb620e4ebfb5261276e7978
https://git.alpinelinux.org/aports/commit/?id=ef10b27afb6ce933891b3e0abf3f090f3e583900
https://git.alpinelinux.org/aports/commit/?id=363df02560b69ec7a4dc6f47f6253aaf91d0457a
https://git.alpinelinux.org/aports/commit/?id=d1d940636b26b200f991e48525737fd511f271d3
https://git.alpinelinux.org/aports/commit/?id=57cd67fa16df97115527b17820f127ef78598e94
https://git.alpinelinux.org/aports/commit/?id=a274bb496caede406362dbb9deecc5b6e9a6b1a2
https://git.alpinelinux.org/aports/commit/?id=47a147e1da5d5640d38900ece14708c44e8e1cf4
https://git.alpinelinux.org/aports/commit/?id=86ed9bddb82ee1c78369d3a0b0b125902c85fb74
https://git.alpinelinux.org/aports/commit/?id=6accf4596e89dcb7b86120055f9bdbf781b15bc0
https://git.alpinelinux.org/aports/commit/?id=fe93077fc235073200c471a387c27261bfc20eb7
https://git.alpinelinux.org/aports/commit/?id=50d8e5e57cc69c22a1fea1300e6bf88db3cc4656
https://git.alpinelinux.org/aports/commit/?id=23b5bada7760b28f341d923d4549f36b4d9dc50b
https://git.alpinelinux.org/aports/commit/?id=2b5198b441b22d8c68cd7131be7c5c0bff746a91
https://git.alpinelinux.org/aports/commit/?id=6bf81f56e8c0b362d9c5ed046d9a8cdb81d5d957
https://git.alpinelinux.org/aports/commit/?id=3ebedbddcbe94e04e8aa5a62b8a249cf1381f388
https://git.alpinelinux.org/aports/commit/?id=5a391f0218b5833dfdfdc704785dd192b82c3793
https://git.alpinelinux.org/aports/commit/?id=2de695e78501528b2d4cb655992bbbf59d5fa812
https://git.alpinelinux.org/aports/commit/?id=bd92489c71902e3b41c595e7aa5a765454d298b0
https://git.alpinelinux.org/aports/commit/?id=6bb185db39802d786dc1b1167f3096133f03d29c
https://git.alpinelinux.org/aports/commit/?id=6216eb1494e2a7aff29dfb6c54c89e700ca43c84
https://git.alpinelinux.org/aports/commit/?id=3caf6320bacb2c3fbd29eb5edcf98b82d935275e
https://git.alpinelinux.org/aports/commit/?id=a1d96f4bc65bb13441ae0ceaeb12c691c70e33ac


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###