VYPR
Unrated severityNVD Advisory· Published Oct 10, 2012· Updated Apr 29, 2026

CVE-2012-4445

CVE-2012-4445

Description

Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small "TLS Message Length" value in an EAP-TLS message with the "More Fragments" flag set.

Affected products

13
  • W1.fi/Hostapd13 versions
    cpe:2.3:a:w1.fi:hostapd:0.6.0:*:*:*:*:*:*:*+ 12 more
    • cpe:2.3:a:w1.fi:hostapd:0.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.4:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.5:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.6:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.6.7:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.7.1:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.7.2:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*
    • cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.