CVE-2018-14526

NameCVE-2018-14526
DescriptionAn issue was discovered in rsn_supp/wpa.c in wpa_supplicant 2.0 through 2.6. Under certain conditions, the integrity of EAPOL-Key messages is not checked, leading to a decryption oracle. An attacker within range of the Access Point and client can abuse the vulnerability to recover sensitive information.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1462-1
NVD severitylow
Debian Bugs905739

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wpa (PTS)jessie2.3-1+deb8u5vulnerable
jessie (security)2.3-1+deb8u9fixed
stretch (security), stretch2:2.4-1+deb9u4fixed
buster2:2.7+git20190128+0c1e29f-6fixed
buster (security)2:2.7+git20190128+0c1e29f-6+deb10u1fixed
bullseye, sid2:2.9-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wpasource(unstable)2:2.6-18905739
wpasourcejessie2.3-1+deb8u6DLA-1462-1
wpasourcestretch2:2.4-1+deb9u2

Notes

https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
https://w1.fi/security/2018-1/0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch
https://w1.fi/security/2018-1/rebased-v2.6-0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch

Search for package or bug name: Reporting problems