Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2019.0229
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2019-0229)
Zusammenfassung:The remote host is missing an update for the 'hostapd, wpa_supplicant' package(s) announced via the MGASA-2019-0229 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'hostapd, wpa_supplicant' package(s) announced via the MGASA-2019-0229 advisory.

Vulnerability Insight:
A number of potential side channel attacks were discovered in the SAE
implementations used by both hostapd (AP) and wpa_supplicant
(infrastructure BSS station/mesh station). SAE (Simultaneous
Authentication of Equals) is also known as WPA3-Personal. The discovered
side channel attacks may be able to leak information about the used
password based on observable timing differences and cache access
patterns. This might result in full password recovery when combined with
an offline dictionary attack and if the password is not strong enough to
protect against dictionary attacks.

Affected Software/OS:
'hostapd, wpa_supplicant' package(s) on Mageia 7.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2019-13377
Bugtraq: 20190929 [SECURITY] [DSA 4538-1] wpa security update (Google Search)
https://seclists.org/bugtraq/2019/Sep/56
Debian Security Information: DSA-4538 (Google Search)
https://www.debian.org/security/2019/dsa-4538
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IELLEPIXWQOJFW4SZMU3WQHO63JFAHA4/
https://w1.fi/cgit/hostap/commit/?id=147bf7b88a9c231322b5b574263071ca6dbb0503
https://w1.fi/cgit/hostap/commit/?id=cd803299ca485eb857e37c88f973fccfbb8600e5
Common Vulnerability Exposure (CVE) ID: CVE-2019-9494
Bugtraq: 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa (Google Search)
https://seclists.org/bugtraq/2019/May/40
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56OBBOJJSKRTDGEXZOVFSTP4HDSDBLAE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SVMJOFEYBGXZLFF5IOLW67SSOPKFEJP3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDOZGR3T7FVO5JSZWK2QPR7AOFIEJTIZ/
FreeBSD Security Advisory: FreeBSD-SA-19:03
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:03.wpa.asc
http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
SuSE Security Announcement: openSUSE-SU-2020:0222 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00021.html
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.