{"id":"CVE-2012-4445","details":"Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small \"TLS Message Length\" value in an EAP-TLS message with the \"More Fragments\" flag set.","modified":"2026-04-10T03:42:29.318597Z","published":"2012-10-10T18:55:04Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/50805"},{"type":"ADVISORY","url":"http://secunia.com/advisories/50888"},{"type":"ADVISORY","url":"http://www.debian.org/security/2012/dsa-2557"},{"type":"ADVISORY","url":"http://www.freebsd.org/security/advisories/FreeBSD-SA-12:07.hostapd.asc"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:168"},{"type":"ADVISORY","url":"http://www.pre-cert.de/advisories/PRE-SA-2012-07.txt"},{"type":"WEB","url":"http://osvdb.org/86051"},{"type":"WEB","url":"http://w1.fi/gitweb/gitweb.cgi?p=hostap.git%3Ba=commitdiff%3Bh=586c446e0ff42ae00315b014924ec669023bd8de"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2012/10/08/3"},{"type":"WEB","url":"http://www.securityfocus.com/bid/55826"},{"type":"WEB","url":"http://www.securitytracker.com/id?1027808"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/79104"}],"schema_version":"1.7.5"}