#VU32434 Heap-based buffer overflow in hostapd - CVE-2012-4445
Published: October 10, 2012 / Updated: July 28, 2020
hostapd
Jouni Malinen
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0. A remote attacker can use a small to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://osvdb.org/86051
- http://secunia.com/advisories/50805
- http://secunia.com/advisories/50888
- http://w1.fi/gitweb/gitweb.cgi?p=hostap.git;a=commitdiff;h=586c446e0ff42ae00315b014924ec669023bd8de
- http://www.debian.org/security/2012/dsa-2557
- http://www.freebsd.org/security/advisories/FreeBSD-SA-12:07.hostapd.asc
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:168
- http://www.openwall.com/lists/oss-security/2012/10/08/3
- http://www.pre-cert.de/advisories/PRE-SA-2012-07.txt
- http://www.securityfocus.com/bid/55826
- http://www.securitytracker.com/id?1027808
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79104