Уязвимость CVE-2017-13080: Информация

Описание

Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.

Важность: MEDIUM (5,3) Вектор: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Опубликовано: 17 октября 2017 г.
Изменено: 11 ноября 2020 г.
Идентификатор типа ошибки: CWE-330

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
hostapdsisyphus2.6-alt22.10-alt2ALT-PU-2017-2440-1190880Исправлено
hostapdp102.6-alt22.10-alt2ALT-PU-2017-2440-1190880Исправлено
hostapdp92.6-alt22.9-alt2ALT-PU-2017-2440-1190880Исправлено
hostapdc10f12.6-alt22.10-alt2ALT-PU-2017-2440-1190880Исправлено
hostapdc9f22.6-alt22.10-alt2ALT-PU-2017-2440-1190880Исправлено
kernel-image-std-defsisyphus4.9.63-alt16.1.87-alt1ALT-PU-2017-2664-1194882Исправлено
kernel-image-std-defp104.9.63-alt15.10.213-alt1ALT-PU-2017-2664-1194882Исправлено
kernel-image-std-defp94.9.63-alt15.4.274-alt1ALT-PU-2017-2664-1194882Исправлено
kernel-image-std-defp84.9.63-alt0.M80P.14.9.337-alt0.M80P.1ALT-PU-2017-2673-1194888Исправлено
kernel-image-std-defc9f24.9.63-alt15.10.214-alt0.c9f.2ALT-PU-2017-2664-1194882Исправлено
kernel-image-std-defc74.4.103-alt0.M70C.1.14.4.277-alt0.M70C.1ALT-PU-2017-2742-1195827Исправлено
kernel-image-std-paep84.4.99-alt0.M80P.14.4.159-alt0.M80P.1ALT-PU-2017-2675-1194889Исправлено
kernel-image-std-paec9f24.4.99-alt14.19.72-alt1ALT-PU-2017-2667-1194887Исправлено
kernel-image-un-defsisyphus4.13.14-alt16.6.28-alt1ALT-PU-2017-2665-1194883Исправлено
kernel-image-un-defp104.13.14-alt16.1.85-alt1ALT-PU-2017-2665-1194883Исправлено
kernel-image-un-defp94.13.14-alt15.10.215-alt1ALT-PU-2017-2665-1194883Исправлено
kernel-image-un-defp84.13.14-alt0.M80P.14.19.310-alt0.M80P.1ALT-PU-2017-2678-1194895Исправлено
kernel-image-un-defc10f14.13.14-alt16.1.85-alt0.c10f.1ALT-PU-2017-2665-1194883Исправлено
kernel-image-un-defc9f24.13.14-alt15.10.29-alt2ALT-PU-2017-2665-1194883Исправлено
kernel-image-un-defc74.9.66-alt0.M70C.1.14.9.277-alt0.M70C.1ALT-PU-2017-2746-1195825Исправлено
wpa_supplicantsisyphus2.6-alt22.10-alt2ALT-PU-2017-2441-1190880Исправлено
wpa_supplicantp102.6-alt22.10-alt2ALT-PU-2017-2441-1190880Исправлено
wpa_supplicantp92.6-alt22.9-alt4ALT-PU-2017-2441-1190880Исправлено
wpa_supplicantp82.6-alt1.M80P.12.6-alt1.M80P.1ALT-PU-2017-2455-1190972Исправлено
wpa_supplicantc10f12.6-alt22.10-alt2ALT-PU-2017-2441-1190880Исправлено
wpa_supplicantc9f22.6-alt22.10-alt2ALT-PU-2017-2441-1190880Исправлено
wpa_supplicantc72.6-alt1.M70C.12.6-alt1.M70C.1ALT-PU-2017-2445-1190889Исправлено

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
https://www.krackattacks.com/
  • Technical Description
  • Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
  • Vendor Advisory
VU#228519
  • Third Party Advisory
  • US Government Resource
1039585
  • Third Party Advisory
  • VDB Entry
1039581
  • Third Party Advisory
  • VDB Entry
1039578
  • Third Party Advisory
  • VDB Entry
1039577
  • Third Party Advisory
  • VDB Entry
1039576
  • Third Party Advisory
  • VDB Entry
1039573
  • Third Party Advisory
  • VDB Entry
1039572
  • Third Party Advisory
  • VDB Entry
101274
  • Third Party Advisory
  • VDB Entry
https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
  • Third Party Advisory
20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
  • Third Party Advisory
https://support.lenovo.com/us/en/product_security/LEN-17420
  • Third Party Advisory
FreeBSD-SA-17:07
  • Third Party Advisory
https://access.redhat.com/security/vulnerabilities/kracks
  • Third Party Advisory
RHSA-2017:2911
  • Third Party Advisory
RHSA-2017:2907
  • Third Party Advisory
USN-3455-1
  • Third Party Advisory
DSA-3999
  • Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
  • Third Party Advisory
openSUSE-SU-2017:2755
  • Third Party Advisory
SUSE-SU-2017:2752
  • Third Party Advisory
SUSE-SU-2017:2745
  • Third Party Advisory
1039703
    GLSA-201711-03
      https://support.apple.com/HT208222
        https://support.apple.com/HT208221
          https://support.apple.com/HT208220
            https://support.apple.com/HT208219
              https://source.android.com/security/bulletin/2017-11-01
                https://support.apple.com/HT208334
                  https://support.apple.com/HT208327
                    https://support.apple.com/HT208325
                      http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
                        [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
                          http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
                            https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03792en_us
                              https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf
                                https://cert.vde.com/en-us/advisories/vde-2017-005
                                  https://cert.vde.com/en-us/advisories/vde-2017-003
                                    [debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
                                      https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html
                                          1. Конфигурация 1

                                            cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

                                            cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*

                                            cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

                                            cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

                                            cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*

                                            cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

                                            cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*

                                            cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*

                                            cpe:2.3:o:redhat:enterprise_linux_server:7:*:*:*:*:*:*:*

                                            cpe:2.3:o:redhat:enterprise_linux_desktop:7:*:*:*:*:*:*:*

                                            cpe:2.3:o:freebsd:freebsd:11:*:*:*:*:*:*:*

                                            cpe:2.3:o:freebsd:freebsd:11.1:*:*:*:*:*:*:*

                                            cpe:2.3:o:freebsd:freebsd:10:*:*:*:*:*:*:*

                                            cpe:2.3:o:freebsd:freebsd:10.4:*:*:*:*:*:*:*

                                            Конфигурация 2

                                            cpe:2.3:a:w1.fi:hostapd:1.1:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:2.4:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:2.0:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.7.3:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:2.3:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:2.1:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:2.2:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:1.0:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:1.0:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:2.4:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:2.3:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:2.5:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.7.3:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:1.1:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:2.2:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:2.1:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:2.0:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:2.6:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.6.10:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.6.9:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.6.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.5.11:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.5.10:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.5.9:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.5.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.5.7:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.4.11:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.4.10:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.4.9:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.4.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.4.7:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.3.11:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.3.10:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.3.9:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.3.7:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.2.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.2.6:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.2.5:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:hostapd:0.2.4:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:2.6:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:2.5:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.6.10:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.6.9:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.6.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.5.11:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.5.10:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.5.9:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.5.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.5.7:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.4.11:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.4.10:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.4.9:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.4.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.4.7:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.3.11:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.3.10:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.3.9:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.3.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.3.7:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.2.8:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.2.7:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.2.6:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.2.5:*:*:*:*:*:*:*

                                            cpe:2.3:a:w1.fi:wpa_supplicant:0.2.4:*:*:*:*:*:*:*

                                            Конфигурация 3

                                            cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*

                                            cpe:2.3:o:suse:linux_enterprise_desktop:12:sp2:*:*:*:*:*:*

                                            cpe:2.3:o:suse:openstack_cloud:6:*:*:*:*:*:*:*

                                            cpe:2.3:o:suse:linux_enterprise_desktop:12:sp3:*:*:*:*:*:*

                                            cpe:2.3:o:suse:linux_enterprise_server:12:*:*:*:ltss:*:*:*

                                            cpe:2.3:o:suse:linux_enterprise_point_of_sale:11:sp3:*:*:*:*:*:*

                                            cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:ltss:*:*