Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-13081

Опубликовано: 17 окт. 2017
Источник: debian

Описание

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firmware-nonfreefixed20180825-1package
firmware-nonfreefixed20161130-4stretchpackage
firmware-nonfreeno-dsajessiepackage
wpafixed2:2.4-1.1package

Примечания

  • https://w1.fi/security/2017-1/

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 8 лет назад

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

CVSS3: 8.1
redhat
почти 8 лет назад

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

CVSS3: 5.3
nvd
почти 8 лет назад

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

CVSS3: 5.3
github
больше 3 лет назад

Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.

suse-cvrf
больше 7 лет назад

Security update for kernel-firmware