hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1733-1 | wpa security update |
Debian DLA |
DLA-2138-1 | wpa security update |
Debian DLA |
DLA-2318-1 | wpa security update |
EUVD |
EUVD-2016-1740 | hostapd before 2.6 does not prevent use of the low-quality PRNG that is reached by an os_random() function call. |
Ubuntu USN |
USN-3944-1 | wpa_supplicant and hostapd vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T03:30:20.386Z
Reserved: 2019-03-23T00:00:00
Link: CVE-2016-10743
No data.
Status : Modified
Published: 2019-03-23T19:29:00.210
Modified: 2024-11-21T02:44:38.797
Link: CVE-2016-10743
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN