CVE编号
CVE-2019-9506利用情况
POC 已公开补丁情况
官方补丁披露时间
2019-08-13漏洞描述
高达5.1版(包括5.1版)的Bluetooth BR / EDR规范允许足够短的加密密钥长度,并且不能防止攻击者影响密钥长度协商。这允许实际的暴力攻击(也称为“ KNOB”),可以解密流量并注入任意密文,而无需受害者注意。解决建议
更新至最新版本
参考链接 |
|
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html | |
http://seclists.org/fulldisclosure/2019/Aug/11 | |
http://seclists.org/fulldisclosure/2019/Aug/13 | |
http://seclists.org/fulldisclosure/2019/Aug/14 | |
http://seclists.org/fulldisclosure/2019/Aug/15 | |
http://www.cs.ox.ac.uk/publications/publication12404-abstract.html | |
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190828-01-knob-en | |
https://access.redhat.com/errata/RHSA-2019:2975 | |
https://access.redhat.com/errata/RHSA-2019:3055 | |
https://access.redhat.com/errata/RHSA-2019:3076 | |
https://access.redhat.com/errata/RHSA-2019:3089 | |
https://access.redhat.com/errata/RHSA-2019:3165 | |
https://access.redhat.com/errata/RHSA-2019:3187 | |
https://access.redhat.com/errata/RHSA-2019:3217 | |
https://access.redhat.com/errata/RHSA-2019:3218 | |
https://access.redhat.com/errata/RHSA-2019:3220 | |
https://access.redhat.com/errata/RHSA-2019:3231 | |
https://access.redhat.com/errata/RHSA-2019:3309 | |
https://access.redhat.com/errata/RHSA-2019:3517 | |
https://access.redhat.com/errata/RHSA-2020:0204 | |
https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html | |
https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html | |
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html | |
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-9506 | |
https://usn.ubuntu.com/4115-1/ | |
https://usn.ubuntu.com/4118-1/ | |
https://usn.ubuntu.com/4147-1/ | |
https://www.bluetooth.com/security/statement-key-negotiation-of-bluetooth/ | |
https://www.kb.cert.org/vuls/id/918987/ | |
https://www.usenix.org/conference/usenixsecurity19/presentation/antonioli |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | centos_7 | linux | * |
Up to (excluding) 3.10.0-1062.4.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | linux | * |
Up to (excluding) 4.18.0-147.el8 |
|||||
运行在以下环境 | |||||||||
系统 | debian_10 | linux | * |
Up to (excluding) 4.19.67-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | linux | * |
Up to (excluding) 3.16.57-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | linux | * |
Up to (excluding) 4.9.185-1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | linux | * |
Up to (excluding) 4.12.14-lp150.12.76.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | linux | * |
Up to (excluding) 4.12.14-lp151.28.20.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | linux | * |
Up to (excluding) 3.10.0-1062.4.1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | linux | * |
Up to (excluding) 4.18.0-147.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | linux | * |
Up to (excluding) 4.18.0-147.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | linux | * |
Up to (excluding) 4.12.14-6.26.1 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | linux | * |
Up to (excluding) 4.12.14-16.7.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | linux | * |
Up to (excluding) 4.4.0-1118.127 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | linux | * |
Up to (excluding) 4.15.0-1047.49 |
|||||
运行在以下环境 | |||||||||
硬件 | blackberry | blackberry | - | - | |||||
- 攻击路径 本地
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 POC 已公开
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 传输被破坏
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...