CVE-2017-13082

NameCVE-2017-13082
DescriptionWi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1150-1, DSA-3999-1
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wpa (PTS)jessie2.3-1+deb8u5fixed
jessie (security)2.3-1+deb8u8fixed
stretch2:2.4-1+deb9u3fixed
stretch (security)2:2.4-1+deb9u4fixed
buster2:2.7+git20190128+0c1e29f-6fixed
bullseye, sid2:2.9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wpasource(unstable)2:2.4-1.1medium
wpasourcejessie2.3-1+deb8u5mediumDSA-3999-1
wpasourcestretch2:2.4-1+deb9u1mediumDSA-3999-1
wpasourcewheezy1.0-3+deb7u5mediumDLA-1150-1

Notes

https://w1.fi/security/2017-1/

Search for package or bug name: Reporting problems