Name | CVE-2023-38321 |
Description | OpenNDS, as used in Sierra Wireless ALEOS before 4.17.0.12 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference, daemon crash, and Captive Portal outage) via a GET request to /opennds_auth/ that lacks a custom query string parameter and client-token. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1059451 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
opennds (PTS) | bookworm | 9.10.0-1 | vulnerable |
sid, trixie | 10.3.0+dfsg-0.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
opennds | source | (unstable) | 10.2.0+dfsg-1 | 1059451 |
https://github.com/openNDS/openNDS/commit/cd4004fc3cf79c0f2bc0ee98db30d225d0b79bc9 (v10.1.2)
https://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2023-006-r3.ashx
While not specifically listed in the commit message, this appears to be the same fix as for CVE-2023-38320/CVE-2023-38322