CVE-2017-13079
17.10.2017, 13:29
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.Enginsight
| Vendor | Product | Version |
|---|---|---|
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 16.04 |
| canonical | ubuntu_linux | 17.04 |
| debian | debian_linux | 8.0 |
| debian | debian_linux | 9.0 |
| freebsd | freebsd | * |
| freebsd | freebsd | 10.4 |
| freebsd | freebsd | 11.1 |
| opensuse | leap | 42.2 |
| opensuse | leap | 42.3 |
| w1.fi | hostapd | 0.2.4 |
| w1.fi | hostapd | 0.2.5 |
| w1.fi | hostapd | 0.2.6 |
| w1.fi | hostapd | 0.2.8 |
| w1.fi | hostapd | 0.3.7 |
| w1.fi | hostapd | 0.3.9 |
| w1.fi | hostapd | 0.3.10 |
| w1.fi | hostapd | 0.3.11 |
| w1.fi | hostapd | 0.4.7 |
| w1.fi | hostapd | 0.4.8 |
| w1.fi | hostapd | 0.4.9 |
| w1.fi | hostapd | 0.4.10 |
| w1.fi | hostapd | 0.4.11 |
| w1.fi | hostapd | 0.5.7 |
| w1.fi | hostapd | 0.5.8 |
| w1.fi | hostapd | 0.5.9 |
| w1.fi | hostapd | 0.5.10 |
| w1.fi | hostapd | 0.5.11 |
| w1.fi | hostapd | 0.6.8 |
| w1.fi | hostapd | 0.6.9 |
| w1.fi | hostapd | 0.6.10 |
| w1.fi | hostapd | 0.7.3 |
| w1.fi | hostapd | 1.0 |
| w1.fi | hostapd | 1.1 |
| w1.fi | hostapd | 2.0 |
| w1.fi | hostapd | 2.1 |
| w1.fi | hostapd | 2.2 |
| w1.fi | hostapd | 2.3 |
| w1.fi | hostapd | 2.4 |
| w1.fi | hostapd | 2.5 |
| w1.fi | hostapd | 2.6 |
| w1.fi | wpa_supplicant | 0.2.4 |
| w1.fi | wpa_supplicant | 0.2.5 |
| w1.fi | wpa_supplicant | 0.2.6 |
| w1.fi | wpa_supplicant | 0.2.7 |
| w1.fi | wpa_supplicant | 0.2.8 |
| w1.fi | wpa_supplicant | 0.3.7 |
| w1.fi | wpa_supplicant | 0.3.8 |
| w1.fi | wpa_supplicant | 0.3.9 |
| w1.fi | wpa_supplicant | 0.3.10 |
| w1.fi | wpa_supplicant | 0.3.11 |
| w1.fi | wpa_supplicant | 0.4.7 |
| w1.fi | wpa_supplicant | 0.4.8 |
| w1.fi | wpa_supplicant | 0.4.9 |
| w1.fi | wpa_supplicant | 0.4.10 |
| w1.fi | wpa_supplicant | 0.4.11 |
| w1.fi | wpa_supplicant | 0.5.7 |
| w1.fi | wpa_supplicant | 0.5.8 |
| w1.fi | wpa_supplicant | 0.5.9 |
| w1.fi | wpa_supplicant | 0.5.10 |
| w1.fi | wpa_supplicant | 0.5.11 |
| w1.fi | wpa_supplicant | 0.6.8 |
| w1.fi | wpa_supplicant | 0.6.9 |
| w1.fi | wpa_supplicant | 0.6.10 |
| w1.fi | wpa_supplicant | 0.7.3 |
| w1.fi | wpa_supplicant | 1.0 |
| w1.fi | wpa_supplicant | 1.1 |
| w1.fi | wpa_supplicant | 2.0 |
| w1.fi | wpa_supplicant | 2.1 |
| w1.fi | wpa_supplicant | 2.2 |
| w1.fi | wpa_supplicant | 2.3 |
| w1.fi | wpa_supplicant | 2.4 |
| w1.fi | wpa_supplicant | 2.5 |
| w1.fi | wpa_supplicant | 2.6 |
𝑥
= Vulnerable software versions
Debian Releases
Debian Product | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| firmware-nonfree |
| ||||||||||||||
| wpa |
|
Ubuntu Releases
Common Weakness Enumeration
References