wpa_supplicant-0.7.3-9.AXS4.2
エラータID: AXSA:2017-2338:02
The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP,
WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They
implement key negotiation with a WPA Authenticator for client stations and
controls the roaming and IEEE 802.11 authentication and association of the
WLAN driver.
Security Fix(es):
* A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13087)
Asianux would like to thank CERT for reporting these issues. Upstream
acknowledges Mathy Vanhoef (University of Leuven) as the original reporter of
these issues.
CVE-2017-13077
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the
Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way
handshake, allowing an attacker within radio range to replay, decrypt,
or spoof frames.
CVE-2017-13078
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the
Group Temporal Key (GTK) during the four-way handshake, allowing an
attacker within radio range to replay frames from access points to
clients.
CVE-2017-13080
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the
Group Temporal Key (GTK) during the group key handshake, allowing an
attacker within radio range to replay frames from access points to
clients.
CVE-2017-13087
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows
reinstallation of the Group Temporal Key (GTK) when processing a
Wireless Network Management (WNM) Sleep Mode Response frame, allowing
an attacker within radio range to replay frames from access points to
clients.
Update packages.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
N/A
SRPMS
- wpa_supplicant-0.7.3-9.AXS4.2.src.rpm
MD5: 032d69e0c22507efe18e45dcccf02a49
SHA-256: 42983367a4fc603d0bb75d9e69116f397885ed18c67a0d5b6d0a5d81d56fde49
Size: 1.64 MB
Asianux Server 4 for x86
- wpa_supplicant-0.7.3-9.AXS4.2.i686.rpm
MD5: 22a605232768c3b0f3936a4e952c61df
SHA-256: 3ea51f51d61f9ef702fe14edb82042d2e882d91e8e62df7bd1058547f4baa5cd
Size: 367.73 kB
Asianux Server 4 for x86_64
- wpa_supplicant-0.7.3-9.AXS4.2.x86_64.rpm
MD5: 66b1d1bfbc58f212e1936a2495ca44c7
SHA-256: 4a6c535292a19368e032c227bea3d211564442332921d9ee4b0c6378356a7890
Size: 366.91 kB