Show filters
98 Total Results
Displaying 31-40 of 98
Sort by:
Attacker Value
Unknown

CVE-2019-9499

Disclosure Date: April 17, 2019 (last updated November 08, 2023)
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Attacker Value
Unknown

CVE-2019-9498

Disclosure Date: April 17, 2019 (last updated November 08, 2023)
The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Attacker Value
Unknown

CVE-2019-9494

Disclosure Date: April 17, 2019 (last updated November 08, 2023)
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
Attacker Value
Unknown

CVE-2019-9495

Disclosure Date: April 17, 2019 (last updated November 08, 2023)
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
Attacker Value
Unknown

CVE-2017-10987

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-304 issue in FreeRADIUS 3.x before 3.0.15 allows "DHCP - Buffer over-read in fr_dhcp_decode_suboptions()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10982

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-205 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Buffer over-read in fr_dhcp_decode_options()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10984

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-301 issue in FreeRADIUS 3.x before 3.0.15 allows "Write overflow in data2vp_wimax()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
0
Attacker Value
Unknown

CVE-2017-10981

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-204 issue in FreeRADIUS 2.x before 2.2.10 allows "DHCP - Memory leak in fr_dhcp_decode()" and a denial of service.
0
Attacker Value
Unknown

CVE-2017-10979

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-202 issue in FreeRADIUS 2.x before 2.2.10 allows "Write overflow in rad_coalesce()" - this allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code.
0
Attacker Value
Unknown

CVE-2017-10978

Disclosure Date: July 17, 2017 (last updated November 26, 2024)
An FR-GV-201 issue in FreeRADIUS 2.x before 2.2.10 and 3.x before 3.0.15 allows "Read / write overflow in make_secret()" and a denial of service.
0