Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-13377

Опубликовано: 15 авг. 2019
Источник: debian

Описание

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpafixed2:2.9-1package
wpanot-affectedstretchpackage
wpanot-affectedjessiepackage

Примечания

  • https://wpa3.mathyvanhoef.com/#new

  • Added in v2.5: https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog:

  • "added support for Brainpool Elliptic Curves with SAE"

  • Patches: https://w1.fi/security/2019-6/

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 6 лет назад

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.

CVSS3: 5.3
redhat
больше 6 лет назад

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.

CVSS3: 5.9
nvd
больше 6 лет назад

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.

CVSS3: 5.9
github
больше 3 лет назад

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.

CVSS3: 5.9
fstec
больше 6 лет назад

Уязвимость реализации протокола WPA программы-демона пользовательского пространства hostapd, позволяющая нарушителю получить учетные данные