Debian Security Advisory 2557-1

Diskutiere Debian Security Advisory 2557-1 im Security News Forum im Bereich Security Talk; Debian Linux Security Advisory 2557-1 - Timo Warns discovered that the internal authentication server of hostapd, a user space IEEE 802.11 AP and...

  1. #1 newsbot, 09.10.2012
    newsbot

    newsbot Foren Gott

    Dabei seit:
    26.11.2007
    Beiträge:
    9.920
    Zustimmungen:
    1
    Debian Linux Security Advisory 2557-1 - Timo Warns discovered that the internal authentication server of hostapd, a user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator, is vulnerable to a buffer overflow when processing fragmented EAP-TLS messages. As a result, an internal overflow checking routine terminates the process. An attacker can abuse this flaw to conduct denial of service attacks via crafted EAP-TLS messages prior to any authentication.

    Weiterlesen...
     
Thema:

Debian Security Advisory 2557-1

Die Seite wird geladen...

Debian Security Advisory 2557-1 - Ähnliche Themen

  1. Debian Security Advisory 2603-1

    Debian Security Advisory 2603-1: Debian Linux Security Advisory 2603-1 - Paul Ling discovered that Emacs insufficiently restricted the evaluation of Lisp code if...
  2. Debian Security Advisory 2604-1

    Debian Security Advisory 2604-1: Debian Linux Security Advisory 2604-1 - It was discovered that Rails, the Ruby web application development framework, performed insufficient...
  3. Debian Security Advisory 2599-1

    Debian Security Advisory 2599-1: Debian Linux Security Advisory 2599-1 - Google, Inc. discovered that the TurkTrust certification authority included in the Network Security...
  4. Debian Security Advisory 2600-1

    Debian Security Advisory 2600-1: Debian Linux Security Advisory 2600-1 - Jann Horn discovered that users of the CUPS printing system who are part of the lpadmin group could modify...
  5. Debian Security Advisory 2601-1

    Debian Security Advisory 2601-1: Debian Linux Security Advisory 2601-1 - KB Sriram discovered that GnuPG, the GNU Privacy Guard did not sufficiently sanitise public keys on...