Debian DSA-3397-1 : wpa - security update

medium Nessus Plugin ID 86833
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in wpa_supplicant and hostapd. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2015-4141 Kostya Kortchinsky of the Google Security Team discovered a vulnerability in the WPS UPnP function with HTTP chunked transfer encoding which may result in a denial of service.

- CVE-2015-4142 Kostya Kortchinsky of the Google Security Team discovered a vulnerability in the WMM Action frame processing which may result in a denial of service.

- CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146 Kostya Kortchinsky of the Google Security Team discovered that EAP-pwd payload is not properly validated which may result in a denial of service.

- CVE-2015-5310 Jouni Malinen discovered a flaw in the WMM Sleep Mode Response frame processing. A remote attacker can take advantage of this flaw to mount a denial of service.

- CVE-2015-5314 CVE-2015-5315 Jouni Malinen discovered a flaw in the handling of EAP-pwd messages which may result in a denial of service.

- CVE-2015-5316 Jouni Malinen discovered a flaw in the handling of EAP-pwd Confirm messages which may result in a denial of service.

- CVE-2015-8041 Incomplete WPS and P2P NFC NDEF record payload length validation may result in a denial of service.

Solution

Upgrade the wpa packages.

For the oldstable distribution (wheezy), these problems have been fixed in version 1.0-3+deb7u3. The oldstable distribution (wheezy) is only affected by CVE-2015-4141, CVE-2015-4142, CVE-2015-4143 and CVE-2015-8041.

For the stable distribution (jessie), these problems have been fixed in version 2.3-1+deb8u3.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787371

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787372

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787373

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795740

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804707

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804708

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804710

https://security-tracker.debian.org/tracker/CVE-2015-4141

https://security-tracker.debian.org/tracker/CVE-2015-4142

https://security-tracker.debian.org/tracker/CVE-2015-4143

https://security-tracker.debian.org/tracker/CVE-2015-4144

https://security-tracker.debian.org/tracker/CVE-2015-4145

https://security-tracker.debian.org/tracker/CVE-2015-4146

https://security-tracker.debian.org/tracker/CVE-2015-5310

https://security-tracker.debian.org/tracker/CVE-2015-5314

https://security-tracker.debian.org/tracker/CVE-2015-5315

https://security-tracker.debian.org/tracker/CVE-2015-5316

https://security-tracker.debian.org/tracker/CVE-2015-8041

https://security-tracker.debian.org/tracker/CVE-2015-4141

https://security-tracker.debian.org/tracker/CVE-2015-4142

https://security-tracker.debian.org/tracker/CVE-2015-4143

https://security-tracker.debian.org/tracker/CVE-2015-8041

https://packages.debian.org/source/wheezy/wpa

https://packages.debian.org/source/jessie/wpa

https://www.debian.org/security/2015/dsa-3397

Plugin Details

Severity: Medium

ID: 86833

File Name: debian_DSA-3397.nasl

Version: 2.9

Type: local

Agent: unix

Published: 11/11/2015

Updated: 1/11/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:wpa, cpe:/o:debian:debian_linux:7.0, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 11/10/2015

Reference Information

CVE: CVE-2015-4141, CVE-2015-4142, CVE-2015-4143, CVE-2015-4144, CVE-2015-4145, CVE-2015-4146, CVE-2015-5310, CVE-2015-5314, CVE-2015-5315, CVE-2015-5316, CVE-2015-8041

DSA: 3397