FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2012-4445

This CVE name corresponds to:

Entered Topic
2012-11-24 FreeBSD -- Insufficient message length validation for EAP-TLS messages

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2012-4445
Phase Assigned(20120821)

Description

Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.

References

Source Reference
MLIST [oss-security] 20121008 [PRE-SA-2012-07] hostapd: Missing EAP-TLS message length validation
MISC http://www.pre-cert.de/advisories/PRE-SA-2012-07.txt
CONFIRM http://w1.fi/gitweb/gitweb.cgi?p=hostap.git;a=commitdiff;h=586c446e0ff42ae00315b014924ec669023bd8de
DEBIAN DSA-2557
FREEBSD FreeBSD-SA-12:07
MANDRIVA MDVSA-2012:168
BID 55826
OSVDB 86051
SECTRACK 1027808
SECUNIA 50805
SECUNIA 50888
XF hostapd-eaptls-dos(79104)