|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for wpa_supplicant CESA-2017:2911 centos6|
|Summary:||Check the version of wpa_supplicant|
Check the version of wpa_supplicant
The wpa_supplicant packages contain an 802.1X
Supplicant with support for WEP, WPA, WPA2 (IEEE 802.11i / RSN), and various EAP
authentication methods. They implement key negotiation with a WPA Authenticator for
client stations and controls the roaming and IEEE 802.11 authentication and
association of the WLAN driver.
* A new exploitation technique called key reinstallation attacks (KRACK)
affecting WPA2 has been discovered. A remote attacker within Wi-Fi range
could exploit these attacks to decrypt Wi-Fi traffic or possibly inject
forged Wi-Fi packets by manipulating cryptographic handshakes used by the
WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080,
Red Hat would like to thank CERT for reporting these issues. Upstream
acknowledges Mathy Vanhoef (University of Leuven) as the original reporter
of these issues.
wpa_supplicant on CentOS 6
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2017-13077|
Common Vulnerability Exposure (CVE) ID: CVE-2017-13078
Common Vulnerability Exposure (CVE) ID: CVE-2017-13080
Common Vulnerability Exposure (CVE) ID: CVE-2017-13087
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 58880 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.