[manjaro-security] [arch-security] [ASA-201710-23] hostapd: man-in-the-middle
Levente Polyak
anthraxx at archlinux.org
Tue Oct 17 00:32:27 CEST 2017
Arch Linux Security Advisory ASA-201710-23
==========================================
Severity: High
Date : 2017-10-16
CVE-ID : CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080
CVE-2017-13081 CVE-2017-13082 CVE-2017-13087 CVE-2017-13088
Package : hostapd
Type : man-in-the-middle
Remote : Yes
Link : https://security.archlinux.org/AVG-448
Summary
=======
The package hostapd before version 2.6-6 is vulnerable to man-in-the-
middle.
Resolution
==========
Upgrade to 2.6-6.
# pacman -Syu "hostapd>=2.6-6"
The problems have been fixed upstream but no release is available yet.
Workaround
==========
None.
Description
===========
- CVE-2017-13077 (man-in-the-middle)
A vulnerability has been discovered that allows reinstallation of the
pairwise encryption key (PTK-TK) in the 4-way handshake.
- CVE-2017-13078 (man-in-the-middle)
A vulnerability has been discovered that allows reinstallation of the
group key (GTK) in the 4-way handshake.
- CVE-2017-13079 (man-in-the-middle)
A vulnerability has been discovered that allows reinstallation of the
integrity group key (IGTK) in the 4-way handshake.
- CVE-2017-13080 (man-in-the-middle)
A vulnerability has been discovered that allows reinstallation of the
group key (GTK) in the group key handshake.
- CVE-2017-13081 (man-in-the-middle)
A vulnerability has been discovered that allows reinstallation of the
integrity group key (IGTK) in the group key handshake.
- CVE-2017-13082 (man-in-the-middle)
A vulnerability has been discovered that allows accepting a
retransmitted FT Reassociation Request and reinstalling the pairwise
key (PTK) while processing it.
- CVE-2017-13087 (man-in-the-middle)
A vulnerability has been discovered that allows reinstallation of the
group key (GTK) when processing a Wireless Network Management (WNM)
Sleep Mode Response frame.
- CVE-2017-13088 (man-in-the-middle)
A vulnerability has been discovered that allows reinstallation of the
integrity group key (IGTK) when processing a Wireless Network
Management (WNM) Sleep Mode Response frame.
Impact
======
A remote attacker within physical proximity to the target WiFi network
is able to decrypt all data that the victim transmits, inject arbitrary
packets to hijack TCP connection or replay unicast and group-addressed
frames.
References
==========
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
https://papers.mathyvanhoef.com/ccs2017.pdf
https://www.kb.cert.org/vuls/id/228519
https://www.krackattacks.com/
https://w1.fi/cgit/hostap/commit/?id=53bb18cc8b7a4da72e47e4b3752d0d2135cffb23
https://w1.fi/cgit/hostap/commit/?id=0adc9b28b39d414d5febfff752f6a1576f785c85
https://w1.fi/cgit/hostap/commit/?id=cb5132bb35698cc0c743e34fe0e845dfc4c3e410
https://w1.fi/cgit/hostap/commit/?id=0e3bd7ac684a2289aa613347e2f3ad54ad6a9449
https://w1.fi/cgit/hostap/commit/?id=e760851176c77ae6de19821bb1d5bf3ae2cb5187
https://w1.fi/cgit/hostap/commit/?id=2a9c5217b18be9462a5329626e2f95cc7dd8d4f1
https://w1.fi/cgit/hostap/commit/?id=87e2db16bafcbc60b8d0016175814a73c1e8ed45
https://security.archlinux.org/CVE-2017-13077
https://security.archlinux.org/CVE-2017-13078
https://security.archlinux.org/CVE-2017-13079
https://security.archlinux.org/CVE-2017-13080
https://security.archlinux.org/CVE-2017-13081
https://security.archlinux.org/CVE-2017-13082
https://security.archlinux.org/CVE-2017-13087
https://security.archlinux.org/CVE-2017-13088
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 866 bytes
Desc: OpenPGP digital signature
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20171017/3ba24fbb/attachment-0001.sig>
More information about the manjaro-security
mailing list