CVE-2017-13081
17.10.2017, 13:29
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.Enginsight
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.04 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
freebsd | freebsd | * |
freebsd | freebsd | 10.4 |
freebsd | freebsd | 11.1 |
opensuse | leap | 42.2 |
opensuse | leap | 42.3 |
w1.fi | hostapd | 0.2.4 |
w1.fi | hostapd | 0.2.5 |
w1.fi | hostapd | 0.2.6 |
w1.fi | hostapd | 0.2.8 |
w1.fi | hostapd | 0.3.7 |
w1.fi | hostapd | 0.3.9 |
w1.fi | hostapd | 0.3.10 |
w1.fi | hostapd | 0.3.11 |
w1.fi | hostapd | 0.4.7 |
w1.fi | hostapd | 0.4.8 |
w1.fi | hostapd | 0.4.9 |
w1.fi | hostapd | 0.4.10 |
w1.fi | hostapd | 0.4.11 |
w1.fi | hostapd | 0.5.7 |
w1.fi | hostapd | 0.5.8 |
w1.fi | hostapd | 0.5.9 |
w1.fi | hostapd | 0.5.10 |
w1.fi | hostapd | 0.5.11 |
w1.fi | hostapd | 0.6.8 |
w1.fi | hostapd | 0.6.9 |
w1.fi | hostapd | 0.6.10 |
w1.fi | hostapd | 0.7.3 |
w1.fi | hostapd | 1.0 |
w1.fi | hostapd | 1.1 |
w1.fi | hostapd | 2.0 |
w1.fi | hostapd | 2.1 |
w1.fi | hostapd | 2.2 |
w1.fi | hostapd | 2.3 |
w1.fi | hostapd | 2.4 |
w1.fi | hostapd | 2.5 |
w1.fi | hostapd | 2.6 |
w1.fi | wpa_supplicant | 0.2.4 |
w1.fi | wpa_supplicant | 0.2.5 |
w1.fi | wpa_supplicant | 0.2.6 |
w1.fi | wpa_supplicant | 0.2.7 |
w1.fi | wpa_supplicant | 0.2.8 |
w1.fi | wpa_supplicant | 0.3.7 |
w1.fi | wpa_supplicant | 0.3.8 |
w1.fi | wpa_supplicant | 0.3.9 |
w1.fi | wpa_supplicant | 0.3.10 |
w1.fi | wpa_supplicant | 0.3.11 |
w1.fi | wpa_supplicant | 0.4.7 |
w1.fi | wpa_supplicant | 0.4.8 |
w1.fi | wpa_supplicant | 0.4.9 |
w1.fi | wpa_supplicant | 0.4.10 |
w1.fi | wpa_supplicant | 0.4.11 |
w1.fi | wpa_supplicant | 0.5.7 |
w1.fi | wpa_supplicant | 0.5.8 |
w1.fi | wpa_supplicant | 0.5.9 |
w1.fi | wpa_supplicant | 0.5.10 |
w1.fi | wpa_supplicant | 0.5.11 |
w1.fi | wpa_supplicant | 0.6.8 |
w1.fi | wpa_supplicant | 0.6.9 |
w1.fi | wpa_supplicant | 0.6.10 |
w1.fi | wpa_supplicant | 0.7.3 |
w1.fi | wpa_supplicant | 1.0 |
w1.fi | wpa_supplicant | 1.1 |
w1.fi | wpa_supplicant | 2.0 |
w1.fi | wpa_supplicant | 2.1 |
w1.fi | wpa_supplicant | 2.2 |
w1.fi | wpa_supplicant | 2.3 |
w1.fi | wpa_supplicant | 2.4 |
w1.fi | wpa_supplicant | 2.5 |
w1.fi | wpa_supplicant | 2.6 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
firmware-nonfree |
| ||||||||||||||
wpa |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
linux-firmware |
| ||||||||||||||||||||||
wpa |
|
Common Weakness Enumeration
References