Arch Linux Security Advisory ASA-201710-22 ========================================== Severity: High Date : 2017-10-16 CVE-ID : CVE-2017-13077 CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13082 CVE-2017-13087 CVE-2017-13088 Package : wpa_supplicant Type : man-in-the-middle Remote : Yes Link : https://security.archlinux.org/AVG-447 Summary ======= The package wpa_supplicant before version 1:2.6-11 is vulnerable to man-in-the-middle. Resolution ========== Upgrade to 1:2.6-11. # pacman -Syu "wpa_supplicant>=1:2.6-11" The problems have been fixed upstream but no release is available yet. Workaround ========== None. Description =========== - CVE-2017-13077 (man-in-the-middle) A vulnerability has been discovered that allows reinstallation of the pairwise encryption key (PTK-TK) in the 4-way handshake. - CVE-2017-13078 (man-in-the-middle) A vulnerability has been discovered that allows reinstallation of the group key (GTK) in the 4-way handshake. - CVE-2017-13079 (man-in-the-middle) A vulnerability has been discovered that allows reinstallation of the integrity group key (IGTK) in the 4-way handshake. - CVE-2017-13080 (man-in-the-middle) A vulnerability has been discovered that allows reinstallation of the group key (GTK) in the group key handshake. - CVE-2017-13081 (man-in-the-middle) A vulnerability has been discovered that allows reinstallation of the integrity group key (IGTK) in the group key handshake. - CVE-2017-13082 (man-in-the-middle) A vulnerability has been discovered that allows accepting a retransmitted FT Reassociation Request and reinstalling the pairwise key (PTK) while processing it. - CVE-2017-13087 (man-in-the-middle) A vulnerability has been discovered that allows reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame. - CVE-2017-13088 (man-in-the-middle) A vulnerability has been discovered that allows reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame. Impact ====== A remote attacker within physical proximity to the target WiFi network is able to decrypt all data that the victim transmits, inject arbitrary packets to hijack TCP connection or replay unicast and group-addressed frames. References ========== https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages... https://papers.mathyvanhoef.com/ccs2017.pdf https://www.kb.cert.org/vuls/id/228519 https://www.krackattacks.com/ https://w1.fi/cgit/hostap/commit/?id=53bb18cc8b7a4da72e47e4b3752d0d2135cffb2... https://w1.fi/cgit/hostap/commit/?id=0adc9b28b39d414d5febfff752f6a1576f785c8... https://w1.fi/cgit/hostap/commit/?id=cb5132bb35698cc0c743e34fe0e845dfc4c3e41... https://w1.fi/cgit/hostap/commit/?id=0e3bd7ac684a2289aa613347e2f3ad54ad6a944... https://w1.fi/cgit/hostap/commit/?id=e760851176c77ae6de19821bb1d5bf3ae2cb518... https://w1.fi/cgit/hostap/commit/?id=2a9c5217b18be9462a5329626e2f95cc7dd8d4f... https://w1.fi/cgit/hostap/commit/?id=87e2db16bafcbc60b8d0016175814a73c1e8ed4... https://security.archlinux.org/CVE-2017-13077 https://security.archlinux.org/CVE-2017-13078 https://security.archlinux.org/CVE-2017-13079 https://security.archlinux.org/CVE-2017-13080 https://security.archlinux.org/CVE-2017-13081 https://security.archlinux.org/CVE-2017-13082 https://security.archlinux.org/CVE-2017-13087 https://security.archlinux.org/CVE-2017-13088