CVE-2017-13081
Published: 16 October 2017
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Priority
CVSS 3 base score: 5.3
Status
Package | Release | Status |
---|---|---|
linux-firmware Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(1.170)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(1.170)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1.170)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.157.14)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(1.127.24)
|
|
wpa Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Released
(2.4-0ubuntu10)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Released
(2.4-0ubuntu10)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(2.4-0ubuntu10)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(2.4-0ubuntu6.2)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(2.1-0ubuntu1.5)
|
Notes
Author | Note |
---|---|
mdeslaur | related to intel wireless firmware issue CVE-2017-5729 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13081
- https://www.krackattacks.com/
- https://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
- https://usn.ubuntu.com/usn/usn-3455-1
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00101.html
- https://usn.ubuntu.com/usn/usn-3505-1
- NVD
- Launchpad
- Debian