Vulnerability CVE-2019-10064


Published: 2020-02-28

Description:
hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743.

Type:

CWE-331

(Insufficient Entropy)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
W1.fi -> Hostapd 

 References:
http://packetstormsecurity.com/files/156573/Hostapd-Insufficient-Entropy.html
http://seclists.org/fulldisclosure/2020/Feb/26
http://www.openwall.com/lists/oss-security/2020/02/27/1
http://www.openwall.com/lists/oss-security/2020/02/27/2
https://w1.fi/cgit/hostap/commit/?id=98a516eae8260e6fd5c48ddecf8d006285da7389

Copyright 2024, cxsecurity.com

 

Back to Top