First published: Wed Apr 10 2019(Updated: )
It was discovered that wpa_supplicant and hostapd were vulnerable to a side channel attack against EAP-pwd. A remote attacker could possibly use this issue to recover certain passwords. (CVE-2019-9495) Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly validated received scalar and element values in EAP-pwd-Commit messages. A remote attacker could possibly use this issue to perform a reflection attack and authenticate without the appropriate password. (CVE-2019-9497, CVE-2019-9498, CVE-2019-9499) It was discovered that hostapd incorrectly handled obtaining random numbers. In rare cases where the urandom device isn't available, it would fall back to using a low-quality PRNG. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-10743)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/hostapd | <2:2.6-18ubuntu1.1 | 2:2.6-18ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/wpasupplicant | <2:2.6-18ubuntu1.1 | 2:2.6-18ubuntu1.1 |
=18.10 | ||
All of | ||
ubuntu/hostapd | <2:2.6-15ubuntu2.2 | 2:2.6-15ubuntu2.2 |
=18.04 | ||
All of | ||
ubuntu/wpasupplicant | <2:2.6-15ubuntu2.2 | 2:2.6-15ubuntu2.2 |
=18.04 | ||
All of | ||
ubuntu/hostapd | <1:2.4-0ubuntu6.4 | 1:2.4-0ubuntu6.4 |
=16.04 | ||
All of | ||
ubuntu/wpasupplicant | <2.4-0ubuntu6.4 | 2.4-0ubuntu6.4 |
=16.04 | ||
All of | ||
ubuntu/hostapd | <1:2.1-0ubuntu1.7 | 1:2.1-0ubuntu1.7 |
=14.04 | ||
All of | ||
ubuntu/wpasupplicant | <2.1-0ubuntu1.7 | 2.1-0ubuntu1.7 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this security advisory is USN-3944-1.
The severity of USN-3944-1 is not mentioned in the description.
The affected software for USN-3944-1 are wpa_supplicant and hostapd.
The impact of USN-3944-1 is that a remote attacker could possibly use a side channel attack against EAP-pwd to recover certain passwords.
To fix the vulnerability for USN-3944-1, update the affected software to the recommended version provided by the vendor.