Debian DSA-2557-1 : hostapd - buffer overflow

medium Nessus Plugin ID 62452

Synopsis

The remote Debian host is missing a security-related update.

Description

Timo Warns discovered that the internal authentication server of hostapd, a user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator, is vulnerable to a buffer overflow when processing fragmented EAP-TLS messages. As a result, an internal overflow checking routine terminates the process. An attacker can abuse this flaw to conduct denial of service attacks via crafted EAP-TLS messages prior to any authentication.

Solution

Upgrade the hostapd packages.

For the stable distribution (squeeze), this problem has been fixed in version 1:0.6.10-2+squeeze1.

See Also

https://packages.debian.org/source/squeeze/hostapd

https://www.debian.org/security/2012/dsa-2557

Plugin Details

Severity: Medium

ID: 62452

File Name: debian_DSA-2557.nasl

Version: 1.9

Type: local

Agent: unix

Published: 10/9/2012

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:hostapd, cpe:/o:debian:debian_linux:6.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 10/8/2012

Reference Information

CVE: CVE-2012-4445

DSA: 2557