* [gentoo-announce] [ GLSA 201711-03 ] hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks
@ 2017-11-10 22:40 99% Aaron Bauman
0 siblings, 0 replies; 1+ results
From: Aaron Bauman @ 2017-11-10 22:40 UTC (permalink / raw
To: gentoo-announce
[-- Attachment #1.1: Type: text/plain, Size: 2629 bytes --]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201711-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK)
attacks
Date: November 10, 2017
Bugs: #634436, #634438
ID: 201711-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A flaw was discovered in the 4-way handshake in hostapd and
wpa_supplicant that allows attackers to conduct a Man in the Middle
attack.
Background
==========
wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE
802.11i / RSN). hostapd is a user space daemon for access point and
authentication servers.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-wireless/hostapd < 2.6-r1 >= 2.6-r1
2 net-wireless/wpa_supplicant
< 2.6-r3 >= 2.6-r3
-------------------------------------------------------------------
2 affected packages
Description
===========
WiFi Protected Access (WPA and WPA2) and it's associated technologies
are all vulnerable to the KRACK attacks. Please review the referenced
CVE identifiers for details.
Impact
======
An attacker can carry out the KRACK attacks on a wireless network in
order to gain access to network clients. Once achieved, the attacker
can potentially harvest confidential information (e.g. HTTP/HTTPS),
inject malware, or perform a myriad of other attacks.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All hostapd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.6-r1"
All wpa_supplicant users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot -v ">=net-wireless/wpa_supplicant-2.6-r3"
References
==========
[ 1 ] CVE-2017-13077
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077
[ 2 ] CVE-2017-13078
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078
[ 3 ] CVE-2017-13079
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079
[ 4 ] CVE-2017-13080
[-- Attachment #1.2: Type: text/html, Size: 28171 bytes --]
[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 488 bytes --]
^ permalink raw reply [relevance 99%]
Results 1-1 of 1 | reverse | options above
-- pct% links below jump to the message on this page, permalinks otherwise --
2017-11-10 22:40 99% [gentoo-announce] [ GLSA 201711-03 ] hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks Aaron Bauman
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox