CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.4%
Package : firmware-nonfree
Version : 20161130-4~deb8u1
CVE ID : CVE-2016-0801 CVE-2017-0561 CVE-2017-9417 CVE-2017-13077
CVE-2017-13078 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081
Debian Bug : 620066 724970 769633 774914 790061 793544 793874 795303
800090 800440 800820 801514 802970 803920 808792 816350
823402 823637 826996 832925 833355 833876 838038 838476
838858 841092 842762 854695 854907 856853 862458 869639
907320
Several vulnerabilities have been discovered in the firmware for
Broadcom BCM43xx wifi chips that may lead to a privilege escalation
or loss of confidentiality.
CVE-2016-0801
Broadgate Team discovered flaws in packet processing in the
Broadcom wifi firmware and proprietary drivers that could lead to
remote code execution. However, this vulnerability is not
believed to affect the drivers used in Debian.
CVE-2017-0561
Gal Beniamini of Project Zero discovered a flaw in the TDLS
implementation in Broadcom wifi firmware. This could be exploited
by an attacker on the same WPA2 network to execute code on the
wifi microcontroller.
CVE-2017-9417 / #869639
Nitay Artenstein of Exodus Intelligence discovered a flaw in the
WMM implementation in Broadcom wifi firmware. This could be
exploited by a nearby attacker to execute code on the wifi
microcontroller.
CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080,
CVE-2017-13081
Mathy Vanhoef of the imec-DistriNet research group of KU Leuven
discovered multiple vulnerabilities in the WPA protocol used for
authentication in wireless networks, dubbed "KRACK".
An attacker exploiting the vulnerabilities could force the
vulnerable system to reuse cryptographic session keys, enabling a
range of cryptographic attacks against the ciphers used in WPA1
and WPA2.
These vulnerabilities are only being fixed for certain Broadcom
wifi chips, and might still be present in firmware for other wifi
hardware.
For Debian 8 "Jessie", these problems have been fixed in version
20161130-4~deb8u1. This version also adds new firmware and packages
for use with Linux 4.9, and re-adds firmware-{adi,ralink} as
transitional packages.
We recommend that you upgrade your firmware-nonfree packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
–
Ben Hutchings - Debian developer, member of kernel, installer and LTS teams
Attachment:
signature.asc
Description: This is a digitally signed message part
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | all | firmware-netxen | < 20161130-4 | firmware-netxen_20161130-4_all.deb |
Debian | 9 | ppc64el | wpasupplicant | < 2:2.4-1+deb9u1 | wpasupplicant_2:2.4-1+deb9u1_ppc64el.deb |
Debian | 8 | powerpc | wpagui | < 2.3-1+deb8u5 | wpagui_2.3-1+deb8u5_powerpc.deb |
Debian | 7 | amd64 | wpasupplicant-udeb | < 1.0-3+deb7u5 | wpasupplicant-udeb_1.0-3+deb7u5_amd64.deb |
Debian | 9 | mips64el | hostapd-dbgsym | < 2:2.4-1+deb9u1 | hostapd-dbgsym_2:2.4-1+deb9u1_mips64el.deb |
Debian | 9 | armhf | wpasupplicant-dbgsym | < 2:2.4-1+deb9u1 | wpasupplicant-dbgsym_2:2.4-1+deb9u1_armhf.deb |
Debian | 8 | mipsel | wpagui | < 2.3-1+deb8u5 | wpagui_2.3-1+deb8u5_mipsel.deb |
Debian | 9 | i386 | wpasupplicant-udeb | < 2:2.4-1+deb9u1 | wpasupplicant-udeb_2:2.4-1+deb9u1_i386.deb |
Debian | 8 | i386 | wpasupplicant | < 2.3-1+deb8u5 | wpasupplicant_2.3-1+deb8u5_i386.deb |
Debian | 8 | all | firmware-intel-sound | < 20161130-4~deb8u1 | firmware-intel-sound_20161130-4~deb8u1_all.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.4%