2024-06-28 13:17:52 +00:00

395 lines
21 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182871",
"Version": "oval:org.altlinux.errata:def:20182871",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2871: package `hostapd` update to version 2.7-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2871",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2871",
"Source": "ALTPU"
},
{
"RefID": "BDU:2017-02263",
"RefURL": "https://bdu.fstec.ru/vul/2017-02263",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02264",
"RefURL": "https://bdu.fstec.ru/vul/2017-02264",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02265",
"RefURL": "https://bdu.fstec.ru/vul/2017-02265",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02266",
"RefURL": "https://bdu.fstec.ru/vul/2017-02266",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02267",
"RefURL": "https://bdu.fstec.ru/vul/2017-02267",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02268",
"RefURL": "https://bdu.fstec.ru/vul/2017-02268",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02269",
"RefURL": "https://bdu.fstec.ru/vul/2017-02269",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02270",
"RefURL": "https://bdu.fstec.ru/vul/2017-02270",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02271",
"RefURL": "https://bdu.fstec.ru/vul/2017-02271",
"Source": "BDU"
},
{
"RefID": "BDU:2017-02272",
"RefURL": "https://bdu.fstec.ru/vul/2017-02272",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01659",
"RefURL": "https://bdu.fstec.ru/vul/2023-01659",
"Source": "BDU"
},
{
"RefID": "CVE-2017-13077",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13077",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13078",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13078",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13079",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13079",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13080",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13080",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13081",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13081",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13082",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13082",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13084",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13084",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13086",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13086",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13087",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13087",
"Source": "CVE"
},
{
"RefID": "CVE-2017-13088",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-13088",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5061",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5061",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5062",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5062",
"Source": "CVE"
}
],
"Description": "This update upgrades hostapd to version 2.7-alt1. \nSecurity Fix(es):\n\n * BDU:2017-02263: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (pairwise key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02264: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02265: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (integrity group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02266: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02267: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (integrity group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02268: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (pairwise key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02269: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (STK-key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02270: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (Tunered Direct Link PeerKey) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02271: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2017-02272: Уязвимость протокола WPA2, связанная с ошибками управления криптографическими ключами (integrity group key) и позволяющая получить доступ к зашифрованной информации, передаваемой по беспроводной сети\n\n * BDU:2023-01659: Уязвимость клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с недостатками процедуры аутентификации, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-13077: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the four-way handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.\n\n * CVE-2017-13078: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.\n\n * CVE-2017-13079: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.\n\n * CVE-2017-13080: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.\n\n * CVE-2017-13081: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.\n\n * CVE-2017-13082: Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.\n\n * CVE-2017-13084: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.\n\n * CVE-2017-13086: Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.\n\n * CVE-2017-13087: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.\n\n * CVE-2017-13088: Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.\n\n * CVE-2019-5061: An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.\n\n * CVE-2019-5062: An exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-12-18"
},
"Updated": {
"Date": "2018-12-18"
},
"BDUs": [
{
"ID": "BDU:2017-02263",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02263",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02264",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02264",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02265",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02265",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02266",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02266",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02267",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02267",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02268",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02268",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02269",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02269",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02270",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02270",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02271",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02271",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2017-02272",
"CVSS": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-320",
"Href": "https://bdu.fstec.ru/vul/2017-02272",
"Impact": "High",
"Public": "20170828"
},
{
"ID": "BDU:2023-01659",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-287",
"Href": "https://bdu.fstec.ru/vul/2023-01659",
"Impact": "Low",
"Public": "20190701"
}
],
"CVEs": [
{
"ID": "CVE-2017-13077",
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13077",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-13078",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13078",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-13079",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13079",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-13080",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13080",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-13081",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13081",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-13082",
"CVSS": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13082",
"Impact": "High",
"Public": "20171017"
},
{
"ID": "CVE-2017-13084",
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13084",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-13086",
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13086",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-13087",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13087",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2017-13088",
"CVSS": "AV:A/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-330",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-13088",
"Impact": "Low",
"Public": "20171017"
},
{
"ID": "CVE-2019-5061",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-287",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5061",
"Impact": "Low",
"Public": "20191212"
},
{
"ID": "CVE-2019-5062",
"CVSS": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5062",
"Impact": "Low",
"Public": "20191212"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182871001",
"Comment": "hostapd is earlier than 0:2.7-alt1"
}
]
}
]
}
}
]
}