SB2018082120 - Improper input validation in wpa_supplicant (Alpine package)
Published: August 21, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper input validation (CVE-ID: CVE-2018-14526)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists on the systems where WPA2/RSN style of EAPOL-Key construction is used with TKIP negotiated as the pairwise cipher due to an error when processing malicious input. A remote attacker can send specially crafted unauthenticated EAPOL-Key frame data to modify the Group Transient Key (GTK) and prevent the target system from accepting group-addressed frames.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=7da74780cb6ede70d4440b97f6a5878065b52889
- https://git.alpinelinux.org/aports/commit/?id=5d9b6ee36295e84a95a5f48e7d226f6f2da265a7
- https://git.alpinelinux.org/aports/commit/?id=212b275cc6b0023a8e0c903596134592f42b7fdb
- https://git.alpinelinux.org/aports/commit/?id=32a110e3d9e36fa21fa678aed9b1ac4a9ddc6ac3
- https://git.alpinelinux.org/aports/commit/?id=662ff3103b7273a29d47f90ac9e63cae39b4d000