wpa_supplicant-2.10-5.el9
エラータID: AXSA:2024-8014:01
リリース日:
2024/05/30 Thursday - 18:31
題名:
wpa_supplicant-2.10-5.el9
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- wpa_supplicant の PEAP 実装の eap_peap_decrypt()
関数には、フェーズ 2 の認証処理を迂回できてしまう
問題があるため、Wi-Fi 接続が可能な範囲にいる攻撃者
により、細工された EAP-TLV パケットの送信を介して、
不正な Wi-Fi 接続を可能とする脆弱性が存在します。
(CVE-2023-52160)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2023-52160
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
追加情報:
N/A
ダウンロード:
SRPMS
- wpa_supplicant-2.10-5.el9.src.rpm
MD5: a89263a9259a2f935d15fcb02d5dd40c
SHA-256: 4a4c6d64f1b8a028ad5a12a2df56f9277d5931ef49b447663de6d1a4ce3997a5
Size: 3.38 MB
Asianux Server 9 for x86_64
- wpa_supplicant-2.10-5.el9.x86_64.rpm
MD5: 3fbb2885cb85c022f4b6dea501ef0fe4
SHA-256: 38f82d3a22176ad8cc29570b07f74b93a069a584b149b1b5bf65508272c26cbf
Size: 1.55 MB