Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-10064

Опубликовано: 28 фев. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

РелизСтатусПримечание
bionic

not-affected

2:2.6-15ubuntu2.5
devel

not-affected

2:2.9-1ubuntu2
eoan

not-affected

2:2.9-1ubuntu2
esm-infra-legacy/trusty

needed

esm-infra/bionic

not-affected

2:2.6-15ubuntu2.5
esm-infra/focal

not-affected

2:2.9-1ubuntu2
esm-infra/xenial

needed

focal

not-affected

2:2.9-1ubuntu2
groovy

not-affected

2:2.9-1ubuntu2
hirsute

not-affected

2:2.9-1ubuntu2

Показывать по

EPSS

Процентиль: 80%
0.01405
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 6 лет назад

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

CVSS3: 7.5
nvd
почти 6 лет назад

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

CVSS3: 7.5
debian
почти 6 лет назад

hostapd before 2.6, in EAP mode, makes calls to the rand() and random( ...

github
больше 3 лет назад

hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

CVSS3: 5.3
fstec
почти 6 лет назад

Уязвимость функции rand() and random() программной сертификации устройств беспроводной сети WPA, связанная с недостатком в энтропии в выборе PIN, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 80%
0.01405
Низкий

5 Medium

CVSS2

7.5 High

CVSS3