Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in wpa_supplicant
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in wpa_supplicant
ID: USN-3944-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10
Datum: Mi, 10. April 2019, 23:03
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10743
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9499
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9495
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9498
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9497
Applikationen: wpa_supplicant

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4523054326147128699==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="4EsNJe7TmlCbC9tWfkxbQ0Y7L5tLI81Fi"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--4EsNJe7TmlCbC9tWfkxbQ0Y7L5tLI81Fi
Content-Type: multipart/mixed;
boundary="5wyZtQgYf5uMtOboKAnQ5zIvzqfOCdtYi";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <c9fb208f-08e4-6321-7f86-c262a47923ba@canonical.com>
Subject: [USN-3944-1] wpa_supplicant and hostapd vulnerabilities

--5wyZtQgYf5uMtOboKAnQ5zIvzqfOCdtYi
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3944-1
April 10, 2019

wpa vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in wpa_supplicant and hostapd.

Software Description:
- wpa: client support for WPA and WPA2

Details:

It was discovered that wpa_supplicant and hostapd were vulnerable to a
side channel attack against EAP-pwd. A remote attacker could possibly use
this issue to recover certain passwords. (CVE-2019-9495)

Mathy Vanhoef discovered that wpa_supplicant and hostapd incorrectly
validated received scalar and element values in EAP-pwd-Commit messages. A
remote attacker could possibly use this issue to perform a reflection
attack and authenticate without the appropriate password. (CVE-2019-9497,
CVE-2019-9498, CVE-2019-9499)

It was discovered that hostapd incorrectly handled obtaining random
numbers. In rare cases where the urandom device isn't available, it would
fall back to using a low-quality PRNG. This issue only affected Ubuntu
14.04 LTS and Ubuntu 16.04 LTS. (CVE-2016-10743)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
hostapd 2:2.6-18ubuntu1.1
wpasupplicant 2:2.6-18ubuntu1.1

Ubuntu 18.04 LTS:
hostapd 2:2.6-15ubuntu2.2
wpasupplicant 2:2.6-15ubuntu2.2

Ubuntu 16.04 LTS:
hostapd 2.4-0ubuntu6.4
wpasupplicant 2.4-0ubuntu6.4

Ubuntu 14.04 LTS:
hostapd 2.1-0ubuntu1.7
wpasupplicant 2.1-0ubuntu1.7

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3944-1
CVE-2016-10743, CVE-2019-9495, CVE-2019-9497, CVE-2019-9498,
CVE-2019-9499

Package Information:
https://launchpad.net/ubuntu/+source/wpa/2:2.6-18ubuntu1.1
https://launchpad.net/ubuntu/+source/wpa/2:2.6-15ubuntu2.2
https://launchpad.net/ubuntu/+source/wpa/2.4-0ubuntu6.4
https://launchpad.net/ubuntu/+source/wpa/2.1-0ubuntu1.7


--5wyZtQgYf5uMtOboKAnQ5zIvzqfOCdtYi--

--4EsNJe7TmlCbC9tWfkxbQ0Y7L5tLI81Fi
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=tUA9
-----END PGP SIGNATURE-----

--4EsNJe7TmlCbC9tWfkxbQ0Y7L5tLI81Fi--


--===============4523054326147128699==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============4523054326147128699==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung