RHEL 7 : wpa_supplicant (RHSA-2017:2907) (KRACK)

medium Nessus Plugin ID 103916
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 6

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An update for wpa_supplicant is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver.

Security Fix(es) :

* A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Red Hat would like to thank CERT for reporting these issues. Upstream acknowledges Mathy Vanhoef (University of Leuven) as the original reporter of these issues.

Solution

Update the affected wpa_supplicant and / or wpa_supplicant-debuginfo packages.

See Also

https://access.redhat.com/security/vulnerabilities/kracks

https://access.redhat.com/errata/RHSA-2017:2907

https://access.redhat.com/security/cve/cve-2017-13077

https://access.redhat.com/security/cve/cve-2017-13078

https://access.redhat.com/security/cve/cve-2017-13080

https://access.redhat.com/security/cve/cve-2017-13082

https://access.redhat.com/security/cve/cve-2017-13086

https://access.redhat.com/security/cve/cve-2017-13087

https://access.redhat.com/security/cve/cve-2017-13088

Plugin Details

Severity: Medium

ID: 103916

File Name: redhat-RHSA-2017-2907.nasl

Version: 3.22

Type: local

Agent: unix

Published: 10/18/2017

Updated: 10/24/2019

Dependencies: 12634

Risk Information

Risk Factor: Medium

VPR Score: 6

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.3

Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:wpa_supplicant, p-cpe:/a:redhat:enterprise_linux:wpa_supplicant-debuginfo, cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:7.4, cpe:/o:redhat:enterprise_linux:7.5, cpe:/o:redhat:enterprise_linux:7.6, cpe:/o:redhat:enterprise_linux:7.7

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 10/17/2017

Vulnerability Publication Date: 10/17/2017

Reference Information

CVE: CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088

RHSA: 2017:2907

IAVA: 2017-A-0310