public inbox for gentoo-announce@lists.gentoo.org
 help / color / mirror / Atom feed
Search results ordered by [date|relevance]  view[summary|nested|Atom feed]
thread overview below | download: 
* [gentoo-announce] [ GLSA 201711-03 ] hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks
@ 2017-11-10 22:40 99% Aaron Bauman
  0 siblings, 0 replies; 1+ results
From: Aaron Bauman @ 2017-11-10 22:40 UTC (permalink / raw
  To: gentoo-announce


[-- Attachment #1.1: Type: text/plain, Size: 2629 bytes --]

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201711-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                           https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
    Title: hostapd and wpa_supplicant: Key Reinstallation (KRACK)
           attacks
     Date: November 10, 2017
     Bugs: #634436, #634438
       ID: 201711-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A flaw was discovered in the 4-way handshake in hostapd and
wpa_supplicant that allows attackers to conduct a Man in the Middle
attack.

Background
==========

wpa_supplicant is a WPA Supplicant with support for WPA and WPA2 (IEEE
802.11i / RSN). hostapd is a user space daemon for access point and
authentication servers.

Affected packages
=================

    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  net-wireless/hostapd         < 2.6-r1                  >= 2.6-r1 
  2  net-wireless/wpa_supplicant
                                  < 2.6-r3                  >= 2.6-r3 
    -------------------------------------------------------------------
     2 affected packages

Description
===========

WiFi Protected Access (WPA and WPA2) and it's associated technologies
are all vulnerable to the KRACK attacks. Please review the referenced
CVE identifiers for details.

Impact
======

An attacker can carry out the KRACK attacks on a wireless network in
order to gain access to network clients. Once achieved, the attacker
can potentially harvest confidential information (e.g. HTTP/HTTPS),
inject malware, or perform a myriad of other attacks.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All hostapd users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-wireless/hostapd-2.6-r1"

All wpa_supplicant users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=net-wireless/wpa_supplicant-2.6-r3"

References
==========

[  1 ] CVE-2017-13077
       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13077
[  2 ] CVE-2017-13078
       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13078
[  3 ] CVE-2017-13079
       https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13079
[  4 ] CVE-2017-13080

[-- Attachment #1.2: Type: text/html, Size: 28171 bytes --]

[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

^ permalink raw reply	[relevance 99%]

Results 1-1 of 1 | reverse | options above
-- pct% links below jump to the message on this page, permalinks otherwise --
2017-11-10 22:40 99% [gentoo-announce] [ GLSA 201711-03 ] hostapd and wpa_supplicant: Key Reinstallation (KRACK) attacks Aaron Bauman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox