Fedora 30 hostapd update to 2.7 with security fixes for multiple CVE
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Fedora | [SECURITY] Fedora 28 Update: hostapd-2.7-2.fc28 | 23 Apr 201918:49 | – | fedora |
Fedora | [SECURITY] Fedora 29 Update: hostapd-2.7-2.fc29 | 23 Apr 201920:15 | – | fedora |
Fedora | [SECURITY] Fedora 30 Update: hostapd-2.7-2.fc30 | 27 Apr 201921:31 | – | fedora |
Fedora | [SECURITY] Fedora 30 Update: wpa_supplicant-2.7-5.fc30 | 15 Apr 201900:04 | – | fedora |
Fedora | [SECURITY] Fedora 30 Update: hostapd-2.8-1.fc30 | 7 Jun 201900:59 | – | fedora |
Fedora | [SECURITY] Fedora 29 Update: hostapd-2.8-1.fc29 | 7 Aug 201901:55 | – | fedora |
Fedora | [SECURITY] Fedora 30 Update: hostapd-2.9-2.fc30 | 9 Nov 201922:40 | – | fedora |
Fedora | [SECURITY] Fedora 30 Update: hostapd-2.9-1.fc30 | 19 Aug 201901:02 | – | fedora |
Tenable Nessus | Fedora 28 : hostapd (2019-d03bae77f5) | 24 Apr 201900:00 | – | nessus |
Tenable Nessus | Fedora 29 : hostapd (2019-f409af9fbe) | 24 Apr 201900:00 | – | nessus |
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2019-eba1109acd.
#
include("compat.inc");
if (description)
{
script_id(124554);
script_version("1.3");
script_cvs_date("Date: 2020/01/21");
script_cve_id("CVE-2019-9494", "CVE-2019-9495", "CVE-2019-9496", "CVE-2019-9497", "CVE-2019-9498", "CVE-2019-9499");
script_xref(name:"FEDORA", value:"2019-eba1109acd");
script_name(english:"Fedora 30 : hostapd (2019-eba1109acd)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Update to version 2.7 from upstream Security fix for CVE-2019-9494
(cache attack against SAE) Security fix for CVE-2019-9495 (cache
attack against EAP-pwd) Security fix for CVE-2019-9496 (SAE confirm
missing state validation in hostapd/AP) Security fix for CVE-2019-9497
(EAP-pwd server not checking for reflection attack) Security fix for
CVE-2019-9498 (EAP-pwd server missing commit validation for
scalar/element) Security fix for CVE-2019-9499 (EAP-pwd peer missing
commit validation for scalar/element)
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bodhi.fedoraproject.org/updates/FEDORA-2019-eba1109acd"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected hostapd package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:hostapd");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:30");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/04/17");
script_set_attribute(attribute:"patch_publication_date", value:"2019/04/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/02");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^30([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 30", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC30", reference:"hostapd-2.7-2.fc30")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "hostapd");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo