Attackers may leverage this issue to crash the application, denying service to legitimate users.
A vulnerability has been reported in hostapd, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to a boundary error within the "eap_server_tls_process_fragment()" function (eap_server/eap_server_tls_common.c) when handling fragment data within TLS messages. This can be exploited to cause a buffer overflow and crash the service via a specially crafted EAP-TLS message.
Successful exploitation requires that hostapd is configured to use the internal EAP authentication server.