Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10064

Опубликовано: 28 фев. 2020
Источник: debian

Описание

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpafixed2:2.6-7package

Примечания

  • https://www.openwall.com/lists/oss-security/2020/02/27/1

  • Comment from upstream: https://www.openwall.com/lists/oss-security/2020/02/27/2

  • Issue fixed in conjunction with CVE-2016-10743.

  • https://w1.fi/cgit/hostap/commit/?id=4b16c15bbc8b20a85bb3d6f45bba5621a047618e

  • There was already a 2.6 upload late in 2016 but then reverted to a 2.4 based

  • version and only reuploaded as 2:2.6-7 to unstable.

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

CVSS3: 7.5
redhat
почти 6 лет назад

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

CVSS3: 7.5
nvd
почти 6 лет назад

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

github
больше 3 лет назад

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

CVSS3: 5.3
fstec
почти 6 лет назад

Уязвимость функции rand() and random() программной сертификации устройств беспроводной сети WPA, связанная с недостатком в энтропии в выборе PIN, позволяющая нарушителю вызвать отказ в обслуживании