CVE-2017-13082

NameCVE-2017-13082
DescriptionWi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1150-1, DSA-3999-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wpa (PTS)stretch2:2.4-1+deb9u6fixed
stretch (security)2:2.4-1+deb9u7fixed
buster2:2.7+git20190128+0c1e29f-6+deb10u2fixed
buster (security)2:2.7+git20190128+0c1e29f-6+deb10u1fixed
bullseye, sid2:2.9.0-15fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wpasourcewheezy1.0-3+deb7u5DLA-1150-1
wpasourcejessie2.3-1+deb8u5DSA-3999-1
wpasourcestretch2:2.4-1+deb9u1DSA-3999-1
wpasource(unstable)2:2.4-1.1

Notes

https://w1.fi/security/2017-1/

Search for package or bug name: Reporting problems