openSUSE Security Update : wpa_supplicant (openSUSE-2017-1163) (KRACK)

medium Nessus Plugin ID 104076

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for wpa_supplicant fixes the security issues :

- Several vulnerabilities in standard conforming implementations of the WPA2 protocol have been discovered and published under the code name KRACK. This update remedies those issues in a backwards compatible manner, i.e. the updated wpa_supplicant can interface properly with both vulnerable and patched implementations of WPA2, but an attacker won't be able to exploit the KRACK weaknesses in those connections anymore even if the other party is still vulnerable.
[bsc#1056061, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088]

This update was imported from the SUSE:SLE-12:Update update project.

Solution

Update the affected wpa_supplicant packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1056061

Plugin Details

Severity: Medium

ID: 104076

File Name: openSUSE-2017-1163.nasl

Version: 3.11

Type: local

Agent: unix

Published: 10/23/2017

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.9

Vector: CVSS2#AV:A/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N

Vulnerability Information

CPE: cpe:/o:novell:opensuse:42.2, p-cpe:/a:novell:opensuse:wpa_supplicant-gui-debuginfo, p-cpe:/a:novell:opensuse:wpa_supplicant-debugsource, p-cpe:/a:novell:opensuse:wpa_supplicant, p-cpe:/a:novell:opensuse:wpa_supplicant-debuginfo, cpe:/o:novell:opensuse:42.3, p-cpe:/a:novell:opensuse:wpa_supplicant-gui

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 10/18/2017

Reference Information

CVE: CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13087, CVE-2017-13088

IAVA: 2017-A-0310