Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-13377
HistoryAug 08, 2019 - 12:00 a.m.

CVE-2019-13377

2019-08-0800:00:00
ubuntu.com
ubuntu.com
13

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

55.2%

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x
through 2.8 are vulnerable to side-channel attacks as a result of
observable timing differences and cache access patterns when Brainpool
curves are used. An attacker may be able to gain leaked information from a
side-channel attack that can be used for full password recovery.

Bugs

Notes

Author Note
leosilva from Debian “bug was added in v2.5”
mdeslaur SAE is not enabled in Ubuntu builds, some of the patches aren’t required.
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchwpa< 2:2.6-15ubuntu2.4UNKNOWN
ubuntu19.04noarchwpa< 2:2.6-21ubuntu3.2UNKNOWN

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

55.2%