-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2807
                            wpa security update
                             11 November 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wpa
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Debian GNU/Linux 8
                   Linux variants
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-8041 CVE-2015-5316 CVE-2015-5315
                   CVE-2015-5314 CVE-2015-5310 CVE-2015-4146
                   CVE-2015-4145 CVE-2015-4144 CVE-2015-4143
                   CVE-2015-4142 CVE-2015-4141 

Reference:         ESB-2015.1925
                   ESB-2015.1573.2
                   ESB-2015.1523

Original Bulletin: 
   http://www.debian.org/security/2015/dsa-3397

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running wpa check for an updated version of the software for their 
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3397-1                   security@debian.org
https://www.debian.org/security/                     Salvatore Bonaccorso
November 10, 2015                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wpa
CVE ID         : CVE-2015-4141 CVE-2015-4142 CVE-2015-4143 CVE-2015-4144
                 CVE-2015-4145 CVE-2015-4146 CVE-2015-5310 CVE-2015-5314
                 CVE-2015-5315 CVE-2015-5316 CVE-2015-8041
Debian Bug     : 787371 787372 787373 795740 804707 804708 804710

Several vulnerabilities have been discovered in wpa_supplicant and
hostapd. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2015-4141

    Kostya Kortchinsky of the Google Security Team discovered a
    vulnerability in the WPS UPnP function with HTTP chunked transfer
    encoding which may result in a denial of service.

CVE-2015-4142

    Kostya Kortchinsky of the Google Security Team discovered a
    vulnerability in the WMM Action frame processing which may result in
    a denial of service.

CVE-2015-4143 CVE-2015-4144 CVE-2015-4145 CVE-2015-4146

    Kostya Kortchinsky of the Google Security Team discovered that
    EAP-pwd payload is not properly validated which may result in a
    denial of service.

CVE-2015-5310

    Jouni Malinen discovered a flaw in the WMM Sleep Mode Response frame
    processing. A remote attacker can take advantage of this flaw to
    mount a denial of service.

CVE-2015-5314 CVE-2015-5315

    Jouni Malinen discovered a flaw in the handling of EAP-pwd messages
    which may result in a denial of service.

CVE-2015-5316

    Jouni Malinen discovered a flaw in the handling of EAP-pwd Confirm
    messages which may result in a denial of service.

CVE-2015-8041

    Incomplete WPS and P2P NFC NDEF record payload length validation may
    result in a denial of service.

For the oldstable distribution (wheezy), these problems have been fixed
in version 1.0-3+deb7u3. The oldstable distribution (wheezy) is only
affected by CVE-2015-4141, CVE-2015-4142, CVE-2015-4143 and
CVE-2015-8041.

For the stable distribution (jessie), these problems have been fixed in
version 2.3-1+deb8u3.

We recommend that you upgrade your wpa packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=oQsm
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=kl9b
-----END PGP SIGNATURE-----