CVE-2019-10064
Summary
| CVE | CVE-2019-10064 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-02-28 15:15:00 UTC |
| Updated | 2022-01-01 19:31:00 UTC |
| Description | hostapd before 2.6, in EAP mode, makes calls to the rand() and random() standard library functions without any preceding srand() or srandom() call, which results in inappropriate use of deterministic values. This was fixed in conjunction with CVE-2016-10743. |
Risk And Classification
Problem Types: CWE-331
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Application | W1.fi | Hostapd | All | All | All | All |
| Application | W1.fi | Hostapd | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064) | MLIST | www.openwall.com | Exploit, Mailing List, Third Party Advisory |
| Full Disclosure: Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064) | FULLDISC | seclists.org | Exploit, Mailing List, Third Party Advisory |
| oss-security - Re: Hostapd fails at seeding PRNGS, leading to insufficient entropy (CVE-2016-10743 and CVE-2019-10064) | MLIST | www.openwall.com | Mailing List, Third Party Advisory |
| Hostapd Insufficient Entropy ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| [SECURITY] [DLA 2138-1] wpa security update | MLIST | lists.debian.org | |
| hostap - hostapd/wpa_supplicant | MISC | w1.fi | Patch, Third Party Advisory |
| [SECURITY] [DLA 2318-1] wpa security update | MLIST | lists.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.