CVE-2019-13377

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-13377
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-13377.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-13377
Related
Published
2019-08-15T17:15:13Z
Modified
2024-09-11T04:27:41.601863Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.

References

Affected packages

Alpine:v3.10 / hostapd

Package

Name
hostapd
Purl
pkg:apk/alpine/hostapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8-r1

Affected versions

0.*

0.6.9-r0
0.6.9-r1
0.6.10-r0
0.6.10-r1
0.6.10-r2
0.7.3-r0
0.7.3-r1
0.7.3-r2

1.*

1.0-r0
1.0-r1
1.0-r2
1.1-r0

2.*

2.0-r0
2.0-r1
2.1-r0
2.2-r0
2.3-r0
2.4-r0
2.4-r1
2.5-r0
2.5-r1
2.5-r2
2.5-r3
2.6-r0
2.6-r1
2.6-r2
2.6-r3
2.6-r4
2.6-r5
2.7-r0
2.8-r0

Alpine:v3.10 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
pkg:apk/alpine/wpa_supplicant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8-r2

Affected versions

0.*

0.5.11-r0
0.6.9-r0
0.6.9-r1
0.6.10-r0
0.7.1-r0
0.7.1-r1
0.7.1-r2
0.7.2-r0
0.7.2-r1
0.7.2-r2
0.7.3-r0
0.7.3-r1
0.7.3-r2

1.*

1.0-r0
1.0-r1
1.0-r2
1.1-r0
1.1-r1

2.*

2.0-r0
2.0-r1
2.0-r2
2.0-r3
2.1-r0
2.1-r1
2.1-r2
2.2-r0
2.3-r0
2.3-r1
2.4-r0
2.4-r1
2.4-r2
2.4-r3
2.4-r4
2.4-r5
2.4-r6
2.4-r7
2.4-r8
2.5-r0
2.5-r1
2.5-r2
2.5-r3
2.6-r0
2.6-r1
2.6-r2
2.6-r3
2.6-r4
2.6-r5
2.6-r6
2.6-r7
2.6-r8
2.6-r9
2.6-r10
2.6-r11
2.6-r12
2.6-r13
2.6-r14
2.6-r15
2.7-r0
2.7-r1
2.7-r2
2.7-r3
2.8-r0
2.8-r1

Alpine:v3.9 / hostapd

Package

Name
hostapd
Purl
pkg:apk/alpine/hostapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7-r4

Affected versions

0.*

0.6.9-r0
0.6.9-r1
0.6.10-r0
0.6.10-r1
0.6.10-r2
0.7.3-r0
0.7.3-r1
0.7.3-r2

1.*

1.0-r0
1.0-r1
1.0-r2
1.1-r0

2.*

2.0-r0
2.0-r1
2.1-r0
2.2-r0
2.3-r0
2.4-r0
2.4-r1
2.5-r0
2.5-r1
2.5-r2
2.5-r3
2.6-r0
2.6-r1
2.6-r2
2.6-r3
2.6-r4
2.6-r5
2.7-r0
2.7-r1
2.7-r2
2.7-r3

Alpine:v3.9 / wpa_supplicant

Package

Name
wpa_supplicant
Purl
pkg:apk/alpine/wpa_supplicant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.7-r4

Affected versions

0.*

0.5.11-r0
0.6.9-r0
0.6.9-r1
0.6.10-r0
0.7.1-r0
0.7.1-r1
0.7.1-r2
0.7.2-r0
0.7.2-r1
0.7.2-r2
0.7.3-r0
0.7.3-r1
0.7.3-r2

1.*

1.0-r0
1.0-r1
1.0-r2
1.1-r0
1.1-r1

2.*

2.0-r0
2.0-r1
2.0-r2
2.0-r3
2.1-r0
2.1-r1
2.1-r2
2.2-r0
2.3-r0
2.3-r1
2.4-r0
2.4-r1
2.4-r2
2.4-r3
2.4-r4
2.4-r5
2.4-r6
2.4-r7
2.4-r8
2.5-r0
2.5-r1
2.5-r2
2.5-r3
2.6-r0
2.6-r1
2.6-r2
2.6-r3
2.6-r4
2.6-r5
2.6-r6
2.6-r7
2.6-r8
2.6-r9
2.6-r10
2.6-r11
2.6-r12
2.6-r13
2.6-r14
2.6-r15
2.7-r0
2.7-r1
2.7-r2
2.7-r3

Debian:11 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}