MGASA-2012-0291
Date: | October 11th, 2012 |
Affected releases: | 1, 2 |
Description:
Updated hostapd package fixes security vulnerabilities:
hostapd 0.7.3, and possibly other versions before 1.0, uses 0644
permissions for /etc/hostapd/hostapd.conf, which might allow local users
to obtain sensitive information such as credentials (CVE-2012-2389).
Timo Warns discovered that the internal authentication server of hostapd,
a user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator,
is vulnerable to a buffer overflow when processing fragmented EAP-TLS
messages. As a result, an internal overflow checking routine terminates
the process. An attacker can abuse this flaw to conduct denial of
service attacks via crafted EAP-TLS messages prior to any authentication
(CVE-2012-4445).
Updated Packages:
Mageia 1:
hostapd-0.7.3-2.1.mga1
Mageia 2:
hostapd-0.7.3-4.1.mga2
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2389
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4445
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082475.html
http://www.debian.org/security/2012/dsa-2557
https://bugs.mageia.org/show_bug.cgi?id=7746