An important security update for wpa_supplicant is available for Red Hat Enterprise Linux 6, addressing key reinstallation attacks (KRACK) affecting WPA2
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | CentOS Update for wpa_supplicant CESA-2017:2911 centos6 | 20 Oct 201700:00 | – | openvas |
![]() | RedHat Update for wpa_supplicant RHSA-2017:2911-01 | 20 Oct 201700:00 | – | openvas |
![]() | Intel Active Management Technology WPA2 Key Reinstallation Vulnerabilities - KRACK (INTEL-SA-00101) | 19 Oct 201700:00 | – | openvas |
![]() | RedHat Update for wpa_supplicant RHSA-2017:2907-01 | 18 Oct 201700:00 | – | openvas |
![]() | CentOS Update for wpa_supplicant CESA-2017:2907 centos7 | 18 Oct 201700:00 | – | openvas |
![]() | Cisco Wireless IP Phone 8821 Multiple WPA2 Vulnerabilities | 17 Oct 201700:00 | – | openvas |
![]() | Fedora Update for wpa_supplicant FEDORA-2017-12e76e8364 | 21 Oct 201700:00 | – | openvas |
![]() | Cisco IP Phone 8861 Multiple WPA2 Vulnerabilities | 25 Oct 201700:00 | – | openvas |
![]() | Mageia: Security Advisory (MGASA-2018-0323) | 28 Jan 202200:00 | – | openvas |
![]() | Fedora Update for wpa_supplicant FEDORA-2017-60bfb576b7 | 21 Oct 201700:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(119233);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/07/18");
script_cve_id(
"CVE-2017-13077",
"CVE-2017-13078",
"CVE-2017-13080",
"CVE-2017-13087"
);
script_name(english:"Virtuozzo 6 : wpa_supplicant (VZLSA-2017-2911)");
script_set_attribute(attribute:"synopsis", value:
"The remote Virtuozzo host is missing a security update.");
script_set_attribute(attribute:"description", value:
"An update for wpa_supplicant is now available for Red Hat Enterprise
Linux 6.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
The wpa_supplicant packages contain an 802.1X Supplicant with support
for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP
authentication methods. They implement key negotiation with a WPA
Authenticator for client stations and controls the roaming and IEEE
802.11 authentication and association of the WLAN driver.
Security Fix(es) :
* A new exploitation technique called key reinstallation attacks
(KRACK) affecting WPA2 has been discovered. A remote attacker within
Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or
possibly inject forged Wi-Fi packets by manipulating cryptographic
handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078,
CVE-2017-13080, CVE-2017-13087)
Red Hat would like to thank CERT for reporting these issues. Upstream
acknowledges Mathy Vanhoef (University of Leuven) as the original
reporter of these issues.
Note that Tenable Network Security has attempted to extract the
preceding description block directly from the corresponding Red Hat
security advisory. Virtuozzo provides no description for VZLSA
advisories. Tenable has attempted to automatically clean and format
it as much as possible without introducing additional issues.");
# http://repo.virtuozzo.com/vzlinux/announcements/json/VZLSA-2017-2911.json
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c4375aa7");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2017:2911");
script_set_attribute(attribute:"solution", value:
"Update the affected wpa_supplicant package.");
script_set_cvss_base_vector("CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-13077");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"patch_publication_date", value:"2017/10/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/11/27");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:wpa_supplicant");
script_set_attribute(attribute:"cpe", value:"cpe:/o:virtuozzo:virtuozzo:6");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Virtuozzo Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2018-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Virtuozzo/release", "Host/Virtuozzo/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Virtuozzo/release");
if (isnull(release) || "Virtuozzo" >!< release) audit(AUDIT_OS_NOT, "Virtuozzo");
os_ver = pregmatch(pattern: "Virtuozzo Linux release ([0-9]+\.[0-9])(\D|$)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Virtuozzo");
os_ver = os_ver[1];
if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Virtuozzo 6.x", "Virtuozzo " + os_ver);
if (!get_kb_item("Host/Virtuozzo/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Virtuozzo", cpu);
flag = 0;
pkgs = ["wpa_supplicant-0.7.3-9.vl6.2"];
foreach (pkg in pkgs)
if (rpm_check(release:"Virtuozzo-6", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "wpa_supplicant");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo