~indicator-network-developers/wpasupplicant/07-series

  • Committer: Jouni Malinen
  • Date: 2012-10-07 17:59:01 UTC
  • Revision ID: git-v1:f3043318970a98c98e968ed17b3e2f49dc42c646
EAP-TLS server: Fix TLS Message Length validation

EAP-TLS/PEAP/TTLS/FAST server implementation did not validate TLS
Message Length value properly and could end up trying to store more
information into the message buffer than the allocated size if the first
fragment is longer than the indicated size. This could result in hostapd
process terminating in wpabuf length validation. Fix this by rejecting
messages that have invalid TLS Message Length value.

This would affect cases that use the internal EAP authentication server
in hostapd either directly with IEEE 802.1X or when using hostapd as a
RADIUS authentication server and when receiving an incorrectly
constructed EAP-TLS message. Cases where hostapd uses an external
authentication are not affected.

Thanks to Timo Warns for finding and reporting this issue.

Signed-hostap: Jouni Malinen <j@w1.fi>
intended-for: hostap-1
(cherry picked from commit 586c446e0ff42ae00315b014924ec669023bd8de)
Filename Latest Rev Last Changed Committer Comment Size
..
tests 171 16 years ago Jouni Malinen Added a place for example mac80211_hwsim test case Diff
tools 905 15 years ago Jouni Malinen hwsim_test: Tool for testing data connectivity wit Diff
hostapd.conf 119 16 years ago Jouni Malinen Added mac80211_hwsim - software simulator of 802.1 141 bytes Diff Download File
README 944 15 years ago Jouni Malinen Remove mac80211_hwsim code The hwsim code here ca 2.5 KB Diff Download File
wpa_supplicant.conf 119 16 years ago Jouni Malinen Added mac80211_hwsim - software simulator of 802.1 147 bytes Diff Download File