[pkg-wpa-devel] Bug#689990: wpa: CVE-2012-4445 denial of service

Nico Golde nion at debian.org
Tue Oct 9 09:10:25 UTC 2012


Hi,
* Stefan Lippers-Hollmann <s.L-H at gmx.de> [2012-10-08 23:37]:
> On Monday 08 October 2012, Nico Golde wrote:
> > Package: wpa
> > Severity: grave
> > Tags: security patch
> > 
> > Hi,
> > the following vulnerability was published for hostapd.
> > 
> > CVE-2012-4445[0]:
> > | Timo Warns discovered that the internal authentication server of hostapd,
> > | a user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator,
> > | is vulnerable to a buffer overflow when processing fragmented EAP-TLS
> > | messages.  As a result, an internal overflow checking routine terminates
> > | the process.  An attacker can abuse this flaw to conduct denial of service
> > | attacks via crafted EAP-TLS messages prior to any authentication.
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> > Please also ask for an unblock on -release after fixing this issue so it will
> > be picked up for wheezy.
> > 
> > The patch I used for the DSA: 
> > http://people.debian.org/~nion/nmu-diff/hostapd-0.6.10-2_0.6.10-2+squeeze1.patch
> > 
> > For further information see:
> > 
> > [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4445
> >     http://security-tracker.debian.org/tracker/CVE-2012-4445
> 
> Thanks a lot, I found that one[1] after receiving the ftp-master accept
> already, I'll try to contact a potential sponsor for [2] within the 
> next few hours.

Uploaded :)

Thanks!
Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0xA0A0AAAA



More information about the Pkg-wpa-devel mailing list