Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.2807 wpa security update 11 November 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: wpa Publisher: Debian Operating System: Debian GNU/Linux 7 Debian GNU/Linux 8 Linux variants Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-8041 CVE-2015-5316 CVE-2015-5315 CVE-2015-5314 CVE-2015-5310 CVE-2015-4146 CVE-2015-4145 CVE-2015-4144 CVE-2015-4143 CVE-2015-4142 CVE-2015-4141 Reference: ESB-2015.1925 ESB-2015.1573.2 ESB-2015.1523 Original Bulletin: http://www.debian.org/security/2015/dsa-3397 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running wpa check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3397-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso November 10, 2015 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : wpa CVE ID : CVE-2015-4141 CVE-2015-4142 CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146 CVE-2015-5310 CVE-2015-5314 CVE-2015-5315 CVE-2015-5316 CVE-2015-8041 Debian Bug : 787371 787372 787373 795740 804707 804708 804710 Several vulnerabilities have been discovered in wpa_supplicant and hostapd. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2015-4141 Kostya Kortchinsky of the Google Security Team discovered a vulnerability in the WPS UPnP function with HTTP chunked transfer encoding which may result in a denial of service. CVE-2015-4142 Kostya Kortchinsky of the Google Security Team discovered a vulnerability in the WMM Action frame processing which may result in a denial of service. CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146 Kostya Kortchinsky of the Google Security Team discovered that EAP-pwd payload is not properly validated which may result in a denial of service. CVE-2015-5310 Jouni Malinen discovered a flaw in the WMM Sleep Mode Response frame processing. A remote attacker can take advantage of this flaw to mount a denial of service. CVE-2015-5314 CVE-2015-5315 Jouni Malinen discovered a flaw in the handling of EAP-pwd messages which may result in a denial of service. CVE-2015-5316 Jouni Malinen discovered a flaw in the handling of EAP-pwd Confirm messages which may result in a denial of service. CVE-2015-8041 Incomplete WPS and P2P NFC NDEF record payload length validation may result in a denial of service. For the oldstable distribution (wheezy), these problems have been fixed in version 1.0-3+deb7u3. The oldstable distribution (wheezy) is only affected by CVE-2015-4141, CVE-2015-4142, CVE-2015-4143 and CVE-2015-8041. For the stable distribution (jessie), these problems have been fixed in version 2.3-1+deb8u3. We recommend that you upgrade your wpa packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJWQk59AAoJEAVMuPMTQ89EfRoQAI2Hzz2IVjv2/Vqs+Eb1jN7s B1YeIISf83YOoSLXk1AdFp1irWIJR/1USKjlP3jm7Iedjz/nTqEr8k+4mjtaf1ap QVj07KUhmQYWJqxqCtrOYh5FKMgwZ6pDGbZaU7W9dV0NTyaQ9Yfi7rz2qf87zKlg rB66pMheTQVKwb60z2SLkRCzYxwcneVNt1k2YDymP4vthyjqDD3Hr/xkNQmOpYxD ZZBUVdj2VszBrvQI/7X1zb36viQrTSY/LtiL7V+ouQRQW2iRItHV6UgisKTxqLrc mxFHO910KexOYUlClShvy+uxPcNEFciY+WXJWk6C/vnWn3kgCePEMfHKnmyqpRHX /cpv/tClt9fbkv8pd+pdFKvDT4nUeRkKMvjA788nhB0JsAUpJBV2zM1/OqnqSpEy AkKJpBrAva63k44vrBSpMLQeZph3O4XQxVxd3GQUbnqff/QgfNdt3IZKejieEtr9 aGB9MEbACObsHfJMsyMKTas4wHjUjttli9dv1EjAo+l76uVwqsSsCjkd3hpwGTAa RfPtr406t8S6mJHUHiAnVGBaDRFLNj+GN4VUI03TY1xV+SryDDwvvNt6mqLPwYGQ DrkzMvNdpbZeeAZx4Lktwk3VHHqctpSWxh26+hZu/1gSn2fJt4IBAnuvR7U61L/s dmbD9IrwgfWdrmSOe/8e =oQsm - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVkLMBX6ZAP0PgtI9AQKRzw//SOSSOBLeBKKbLTmcAQw3jjcsmlzEERlh rApO0Kysw7UvbZQGMxqS0AEvlaNA6eQ33KHKoSyDghHc1G9A20hFXteCd5PIMpa2 7hmOH5Wd1QHM1WGC0/2S/7O7uSbkLABwFSyhVB8A9acyFUEME9RhjwWN6CW+Zkhe dX1Wi7bELaxEKjE8+SOP5i2e/5LVd/04eGdwfL9ua7ryqyZso16a4Vg74POlgDrd meXeLSYx8P/FS/G0uxld5qWOb4tPzQc10BGararPXrZaxizv+j+ZXHJ1Of++luVJ xqGnZhj+121LAOlNyaTmzW8FBqrBhYeG9DQr0LnSN6EDXDHwSeq9BpLFcK1hCfQn OTHzgYHF6Rx7R+ccN2XAE8beniZaSin5nukmKme0zE8Ey/tkfbz85mBbCl/3V+x/ GMwPoe/WqW0JnnVG+JFa7Zsx4uxGS/aQFecKeW+Q/2cUxnd1jvWyHJNvo5ZDmD3K XX2/3nW6ks84b+0S0hIuyVw2Xs5aLw/ixejtcr/bLM7DpKDrKZ81AnTBxL/BJyx4 ofIWdMF0AbweAsbpB0q+8Pq5fwjqTu/j0CB22s3ZLPJg7E30hkjPCEVeBt5TWWRd hAwHFpc0mRdTuA74vgZ1uiwyiYzblkqSKIjDo+ZhGb5UhKynmUQzS2HELq8K5cnM tKZIdpjMzIE= =kl9b -----END PGP SIGNATURE-----