CVE-2019-13377

Name
CVE-2019-13377
Description
The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mailing List https://w1.fi/cgit/hostap/commit/?id=cd803299ca485eb857e37c88f973fccfbb8600e5
Mailing List https://w1.fi/cgit/hostap/commit/?id=147bf7b88a9c231322b5b574263071ca6dbb0503
Third Party Advisory https://usn.ubuntu.com/4098-1/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IELLEPIXWQOJFW4SZMU3WQHO63JFAHA4/
DEBIAN https://www.debian.org/security/2019/dsa-4538
BUGTRAQ https://seclists.org/bugtraq/2019/Sep/56

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* hostapd >= 2.0 <= 2.8

Vulnerable and fixed packages

Source package Branch Version Maintainer Status