FreeBSD : FreeBSD -- EAP-pwd message reassembly issue with unexpected fragment (a207bbd8-6572-11e9-8e67-206a8a720317)

high Nessus Plugin ID 124224

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant (EAP peer) does not to validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to NULL pointer dereference.

See https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-un expected-fragment.txt for a detailed description of the bug. Impact :
All wpa_supplicant and hostapd versions with EAP-pwd support could suffer a denial of service attack through process termination.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?892ffe12

http://www.nessus.org/u?acb33364

Plugin Details

Severity: High

ID: 124224

File Name: freebsd_pkg_a207bbd8657211e98e67206a8a720317.nasl

Version: 1.1

Type: local

Published: 4/23/2019

Updated: 4/23/2019

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:hostapd, p-cpe:/a:freebsd:freebsd:wpa_supplicant, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 4/23/2019

Vulnerability Publication Date: 4/18/2019