RHEL 6 : wpa_supplicant (RHSA-2017:2911) (KRACK)

medium Nessus Plugin ID 103958
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An update for wpa_supplicant is now available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The wpa_supplicant packages contain an 802.1X Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP authentication methods. They implement key negotiation with a WPA Authenticator for client stations and controls the roaming and IEEE 802.11 authentication and association of the WLAN driver.

Security Fix(es) :

* A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13087)

Red Hat would like to thank CERT for reporting these issues. Upstream acknowledges Mathy Vanhoef (University of Leuven) as the original reporter of these issues.

Solution

Update the affected wpa_supplicant and / or wpa_supplicant-debuginfo packages.

See Also

https://access.redhat.com/security/vulnerabilities/kracks

https://access.redhat.com/errata/RHSA-2017:2911

https://access.redhat.com/security/cve/cve-2017-13077

https://access.redhat.com/security/cve/cve-2017-13078

https://access.redhat.com/security/cve/cve-2017-13080

https://access.redhat.com/security/cve/cve-2017-13087

Plugin Details

Severity: Medium

ID: 103958

File Name: redhat-RHSA-2017-2911.nasl

Version: 3.18

Type: local

Agent: unix

Published: 10/19/2017

Updated: 10/24/2019

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 6

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4

Vector: AV:A/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:wpa_supplicant, p-cpe:/a:redhat:enterprise_linux:wpa_supplicant-debuginfo, cpe:/o:redhat:enterprise_linux:6

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 10/18/2017

Vulnerability Publication Date: 10/17/2017

Reference Information

CVE: CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13087

RHSA: 2017:2911

IAVA: 2017-A-0310