Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:30929
[Rus]
Version
7
Class
patch
ALTXid
179429
Language
English
Severity
NotAvailable
Title
openSUSE-SU-2017:2896-1 -- Security update for hostapd
Description
This update for hostapd fixes the security issues.
Family
unix
Platform
openSUSE Leap 42.2
openSUSE Leap 42.3
Product
hostapd
Reference
VENDOR: openSUSE-SU-2017:2896-1
VENDOR: openSUSE-SU-2017:2896-1
Id:
openSUSE-SU-2017:2896-1
Reference:
https://lists.opensuse.org/opensuse-updates/2017-10/msg00114.html
CVE: CVE-2015-1863
CVE: CVE-2015-1863
Id:
CVE-2015-1863
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863
Comment
: Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
CVSSv2 Score:
5.8
Access vector:
ADJACENT_NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
openSUSE-SU-2015:0813 (SUSE)
http://packetstormsecurity.com/files/131598/Android-wpa_supplicant-Heap-Overflow.html (MISC)
RHSA-2015:1090 (REDHAT)
20150424 [ALICLOUDSEC-VUL2015-001]Android wpa_supplicant WLAN Direct remote buffer overflow (FULLDISC)
http://security.alibaba.com/blog/blog.htm?spm=0.0.0.0.p1ECc3&id=19 (MISC)
http://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt (CONFIRM)
DSA-3233 (DEBIAN)
20150423 [ALICLOUDSEC-VUL2015-001]Android wpa_supplicant WLAN Direct remote buffer overflow (BUGTRAQ)
74296 (BID)
1032192 (SECTRACK)
USN-2577-1 (UBUNTU)
GLSA-201606-17 (GENTOO)
CVE: CVE-2015-4141
CVE: CVE-2015-4141
Id:
CVE-2015-4141
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141
Comment
: The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
openSUSE-SU-2015:1030 (SUSE)
http://w1.fi/security/2015-2/wps-upnp-http-chunked-transfer-encoding.txt (CONFIRM)
DSA-3397 (DEBIAN)
[oss-security] 20150509 CVE request: hostapd/wpa_supplicant - WPS UPnP vulnerability with HTTP chunked transfer encoding (MLIST)
[oss-security] 20150531 Re: CVE request: vulnerability in wpa_supplicant and hostapd (MLIST)
USN-2650-1 (UBUNTU)
GLSA-201606-17 (GENTOO)
CVE: CVE-2015-4142
CVE: CVE-2015-4142
Id:
CVE-2015-4142
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142
Comment
: Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
openSUSE-SU-2015:1030 (SUSE)
http://w1.fi/security/2015-3/integer-underflow-in-ap-mode-wmm-action-frame.txt (CONFIRM)
RHSA-2015:1090 (REDHAT)
[oss-security] 20150509 CVE request: hostapd/wpa_supplicant - Integer underflow in AP mode WMM Action frame processing (MLIST)
[oss-security] 20150531 Re: CVE request: vulnerability in wpa_supplicant and hostapd (MLIST)
RHSA-2015:1439 (REDHAT)
GLSA-201606-17 (GENTOO)
1032625 (SECTRACK)
FEDORA-2015-cfea96144a (FEDORA)
FEDORA-2015-1521e91178 (FEDORA)
FEDORA-2015-6f16b5e39e (FEDORA)
DSA-3397 (DEBIAN)
USN-2650-1 (UBUNTU)
https://support.apple.com/kb/HT213258 (CONFIRM)
20220516 APPLE-SA-2022-05-16-1 iOS 15.5 and iPadOS 15.5 (FULLDISC)
CVE: CVE-2015-4143
CVE: CVE-2015-4143
Id:
CVE-2015-4143
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143
Comment
: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
openSUSE-SU-2015:1030 (SUSE)
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt (CONFIRM)
DSA-3397 (DEBIAN)
[oss-security] 20150509 Re: CVE request: vulnerability in wpa_supplicant and hostapd (MLIST)
[oss-security] 20150531 Re: CVE request: vulnerability in wpa_supplicant and hostapd (MLIST)
USN-2650-1 (UBUNTU)
GLSA-201606-17 (GENTOO)
CVE: CVE-2015-4144
CVE: CVE-2015-4144
Id:
CVE-2015-4144
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4144
Comment
: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate that a message is long enough to contain the Total-Length field, which allows remote attackers to cause a denial of service (crash) via a crafted message.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
openSUSE-SU-2015:1030 (SUSE)
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt (CONFIRM)
DSA-3397 (DEBIAN)
[oss-security] 20150509 Re: CVE request: vulnerability in wpa_supplicant and hostapd (MLIST)
[oss-security] 20150531 Re: CVE request: vulnerability in wpa_supplicant and hostapd (MLIST)
USN-2650-1 (UBUNTU)
GLSA-201606-17 (GENTOO)
CVE: CVE-2015-4145
CVE: CVE-2015-4145
Id:
CVE-2015-4145
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4145
Comment
: The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 does not validate a fragment is already being processed, which allows remote attackers to cause a denial of service (memory leak) via a crafted message.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
399 (Resource Management Errors)
References:
openSUSE-SU-2015:1030 (SUSE)
http://w1.fi/security/2015-4/eap-pwd-missing-payload-length-validation.txt (CONFIRM)
DSA-3397 (DEBIAN)
[oss-security] 20150509 Re: CVE request: vulnerability in wpa_supplicant and hostapd (MLIST)
[oss-security] 20150531 Re: CVE request: vulnerability in wpa_supplicant and hostapd (MLIST)
USN-2650-1 (UBUNTU)
GLSA-201606-17 (GENTOO)
CVE: CVE-2015-5314
CVE: CVE-2015-5314
Id:
CVE-2015-5314
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5314
Comment
: The eap_pwd_process function in eap_server/eap_server_pwd.c in hostapd 2.x before 2.6 does not validate that the reassembly buffer is large enough for the final fragment when used with (1) an internal EAP server or (2) a RADIUS server and EAP-pwd is enabled in a runtime configuration, which allows remote attackers to cause a denial of service (process termination) via a large final fragment in an EAP-pwd message.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.9
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
http://w1.fi/security/2015-7/eap-pwd-missing-last-fragment-length-validation.txt (CONFIRM)
[oss-security] 20151110 hostapd/wpa_supplicant: EAP-pwd missing last fragment length validation (MLIST)
USN-2808-1 (UBUNTU)
DSA-3397 (DEBIAN)
CVE: CVE-2016-4476
CVE: CVE-2016-4476
Id:
CVE-2016-4476
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4476
Comment
: hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
20 (Improper Input Validation)
References:
[oss-security] 20160503 Re: hostapd/wpa_supplicant - psk configuration parameter update allowing arbitrary data to be written (MLIST)
USN-3455-1 (UBUNTU)
CVE: CVE-2017-13078
CVE: CVE-2017-13078
Id:
CVE-2017-13078
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078
Comment
: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
CVSSv2 Score:
2.9
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:A/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.3
Attack vector:
ADJACENT_NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE:
330 (Use of Insufficiently Random Values)
References:
https://www.krackattacks.com/ (MISC)
VU#228519 (CERT-VN)
1039585 (SECTRACK)
1039581 (SECTRACK)
1039578 (SECTRACK)
1039577 (SECTRACK)
1039576 (SECTRACK)
1039573 (SECTRACK)
101274 (BID)
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt (MISC)
20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II (CISCO)
https://support.lenovo.com/us/en/product_security/LEN-17420 (CONFIRM)
FreeBSD-SA-17:07 (FREEBSD)
https://access.redhat.com/security/vulnerabilities/kracks (CONFIRM)
RHSA-2017:2911 (REDHAT)
RHSA-2017:2907 (REDHAT)
USN-3455-1 (UBUNTU)
DSA-3999 (DEBIAN)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt (CONFIRM)
openSUSE-SU-2017:2755 (SUSE)
SUSE-SU-2017:2752 (SUSE)
SUSE-SU-2017:2745 (SUSE)
GLSA-201711-03 (GENTOO)
https://support.apple.com/HT208222 (CONFIRM)
https://support.apple.com/HT208221 (CONFIRM)
https://support.apple.com/HT208220 (CONFIRM)
https://support.apple.com/HT208219 (CONFIRM)
https://source.android.com/security/bulletin/2017-11-01 (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html (CONFIRM)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf (CONFIRM)
https://cert.vde.com/en-us/advisories/vde-2017-005 (CONFIRM)
https://cert.vde.com/en-us/advisories/vde-2017-003 (CONFIRM)
[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update (MLIST)
CVE: CVE-2017-13079
CVE: CVE-2017-13079
Id:
CVE-2017-13079
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13079
Comment
: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
CVSSv2 Score:
2.9
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:A/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.3
Attack vector:
ADJACENT_NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE:
330 (Use of Insufficiently Random Values)
References:
https://www.krackattacks.com/ (MISC)
VU#228519 (CERT-VN)
1039585 (SECTRACK)
1039581 (SECTRACK)
1039578 (SECTRACK)
1039577 (SECTRACK)
1039576 (SECTRACK)
1039573 (SECTRACK)
101274 (BID)
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt (MISC)
20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II (CISCO)
https://support.lenovo.com/us/en/product_security/LEN-17420 (CONFIRM)
FreeBSD-SA-17:07 (FREEBSD)
https://access.redhat.com/security/vulnerabilities/kracks (CONFIRM)
USN-3455-1 (UBUNTU)
DSA-3999 (DEBIAN)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt (CONFIRM)
openSUSE-SU-2017:2755 (SUSE)
SUSE-SU-2017:2752 (SUSE)
SUSE-SU-2017:2745 (SUSE)
GLSA-201711-03 (GENTOO)
https://source.android.com/security/bulletin/2017-11-01 (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html (CONFIRM)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf (CONFIRM)
https://cert.vde.com/en-us/advisories/vde-2017-005 (CONFIRM)
[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update (MLIST)
CVE: CVE-2017-13080
CVE: CVE-2017-13080
Id:
CVE-2017-13080
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080
Comment
: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
CVSSv2 Score:
2.9
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:A/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.3
Attack vector:
ADJACENT_NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE:
330 (Use of Insufficiently Random Values)
References:
https://www.krackattacks.com/ (MISC)
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080 (CONFIRM)
VU#228519 (CERT-VN)
1039585 (SECTRACK)
1039581 (SECTRACK)
1039578 (SECTRACK)
1039577 (SECTRACK)
1039576 (SECTRACK)
1039573 (SECTRACK)
1039572 (SECTRACK)
101274 (BID)
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt (MISC)
20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II (CISCO)
https://support.lenovo.com/us/en/product_security/LEN-17420 (CONFIRM)
FreeBSD-SA-17:07 (FREEBSD)
https://access.redhat.com/security/vulnerabilities/kracks (CONFIRM)
RHSA-2017:2911 (REDHAT)
RHSA-2017:2907 (REDHAT)
USN-3455-1 (UBUNTU)
DSA-3999 (DEBIAN)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt (CONFIRM)
openSUSE-SU-2017:2755 (SUSE)
SUSE-SU-2017:2752 (SUSE)
SUSE-SU-2017:2745 (SUSE)
1039703 (SECTRACK)
GLSA-201711-03 (GENTOO)
https://support.apple.com/HT208222 (CONFIRM)
https://support.apple.com/HT208221 (CONFIRM)
https://support.apple.com/HT208220 (CONFIRM)
https://support.apple.com/HT208219 (CONFIRM)
https://source.android.com/security/bulletin/2017-11-01 (CONFIRM)
https://support.apple.com/HT208334 (CONFIRM)
https://support.apple.com/HT208327 (CONFIRM)
https://support.apple.com/HT208325 (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html (CONFIRM)
[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update (MLIST)
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html (CONFIRM)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf (CONFIRM)
https://cert.vde.com/en-us/advisories/vde-2017-005 (CONFIRM)
https://cert.vde.com/en-us/advisories/vde-2017-003 (CONFIRM)
[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update (MLIST)
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html (CONFIRM)
CVE: CVE-2017-13081
CVE: CVE-2017-13081
Id:
CVE-2017-13081
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
Comment
: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
CVSSv2 Score:
2.9
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:A/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.3
Attack vector:
ADJACENT_NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE:
330 (Use of Insufficiently Random Values)
References:
https://www.krackattacks.com/ (MISC)
VU#228519 (CERT-VN)
1039585 (SECTRACK)
1039581 (SECTRACK)
1039578 (SECTRACK)
1039577 (SECTRACK)
1039576 (SECTRACK)
1039573 (SECTRACK)
101274 (BID)
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt (MISC)
20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II (CISCO)
FreeBSD-SA-17:07 (FREEBSD)
https://access.redhat.com/security/vulnerabilities/kracks (CONFIRM)
USN-3455-1 (UBUNTU)
DSA-3999 (DEBIAN)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt (CONFIRM)
openSUSE-SU-2017:2755 (SUSE)
SUSE-SU-2017:2752 (SUSE)
SUSE-SU-2017:2745 (SUSE)
GLSA-201711-03 (GENTOO)
https://source.android.com/security/bulletin/2017-11-01 (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html (CONFIRM)
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf (CONFIRM)
https://cert.vde.com/en-us/advisories/vde-2017-005 (CONFIRM)
[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update (MLIST)
CVE: CVE-2017-13087
CVE: CVE-2017-13087
Id:
CVE-2017-13087
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087
Comment
: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
CVSSv2 Score:
2.9
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:A/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.3
Attack vector:
ADJACENT_NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE:
330 (Use of Insufficiently Random Values)
References:
https://www.krackattacks.com/ (MISC)
VU#228519 (CERT-VN)
1039581 (SECTRACK)
1039578 (SECTRACK)
1039577 (SECTRACK)
1039576 (SECTRACK)
1039573 (SECTRACK)
101274 (BID)
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt (MISC)
20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II (CISCO)
https://support.lenovo.com/us/en/product_security/LEN-17420 (CONFIRM)
FreeBSD-SA-17:07 (FREEBSD)
https://access.redhat.com/security/vulnerabilities/kracks (CONFIRM)
RHSA-2017:2911 (REDHAT)
RHSA-2017:2907 (REDHAT)
USN-3455-1 (UBUNTU)
DSA-3999 (DEBIAN)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt (CONFIRM)
openSUSE-SU-2017:2755 (SUSE)
SUSE-SU-2017:2752 (SUSE)
SUSE-SU-2017:2745 (SUSE)
GLSA-201711-03 (GENTOO)
https://source.android.com/security/bulletin/2017-11-01 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf (CONFIRM)
https://cert.vde.com/en-us/advisories/vde-2017-005 (CONFIRM)
CVE: CVE-2017-13088
CVE: CVE-2017-13088
Id:
CVE-2017-13088
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088
Comment
: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
CVSSv2 Score:
2.9
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:A/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
5.3
Attack vector:
ADJACENT_NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE:
330 (Use of Insufficiently Random Values)
References:
https://www.krackattacks.com/ (MISC)
VU#228519 (CERT-VN)
1039581 (SECTRACK)
1039578 (SECTRACK)
1039577 (SECTRACK)
1039576 (SECTRACK)
1039573 (SECTRACK)
101274 (BID)
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt (MISC)
20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II (CISCO)
https://support.lenovo.com/us/en/product_security/LEN-17420 (CONFIRM)
FreeBSD-SA-17:07 (FREEBSD)
https://access.redhat.com/security/vulnerabilities/kracks (CONFIRM)
RHSA-2017:2907 (REDHAT)
USN-3455-1 (UBUNTU)
DSA-3999 (DEBIAN)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt (CONFIRM)
openSUSE-SU-2017:2755 (SUSE)
SUSE-SU-2017:2752 (SUSE)
SUSE-SU-2017:2745 (SUSE)
GLSA-201711-03 (GENTOO)
https://source.android.com/security/bulletin/2017-11-01 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf (CONFIRM)
https://cert.vde.com/en-us/advisories/vde-2017-005 (CONFIRM)
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html (CONFIRM)
Content available only for registered users!
ovaldb@altx-soft.com