Lucene search

K
slackwareSlackware Linux ProjectSSA-2024-059-01
HistoryFeb 28, 2024 - 6:40 p.m.

[slackware-security] wpa_supplicant

2024-02-2818:40:04
Slackware Linux Project
www.slackware.com
10
wpa_supplicant
slackware 15.0
-current
security
fix
authentication bypass
peap
tls certificate
vulnerability
cve-2023-52160
upgrade

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

35.9%

New wpa_supplicant packages are available for Slackware 15.0 and -current to
fix a security issue.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/wpa_supplicant-2.10-i586-2_slack15.0.txz: Rebuilt.
Patched the implementation of PEAP in wpa_supplicant to prevent an
authentication bypass. For a successful attack, wpa_supplicant must be
configured to not verify the network’s TLS certificate during Phase 1
authentication, and an eap_peap_decrypt vulnerability can then be abused
to skip Phase 2 authentication. The attack vector is sending an EAP-TLV
Success packet instead of starting Phase 2. This allows an adversary to
impersonate Enterprise Wi-Fi networks.
For more information, see:
https://vulners.com/cve/CVE-2023-52160
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/wpa_supplicant-2.10-i586-2_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/wpa_supplicant-2.10-x86_64-2_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/wpa_supplicant-2.10-i586-3.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/wpa_supplicant-2.10-x86_64-3.txz

MD5 signatures:

Slackware 15.0 package:
2be83120eeae199735756d3ecfc9afd8 wpa_supplicant-2.10-i586-2_slack15.0.txz

Slackware x86_64 15.0 package:
2bcea46d6ae7cd861208fe92f08e44ce wpa_supplicant-2.10-x86_64-2_slack15.0.txz

Slackware -current package:
d44e7e706bc44d6c2978e97bdf6299d3 n/wpa_supplicant-2.10-i586-3.txz

Slackware x86_64 -current package:
5bb12ec9109ef4dbb58b4a0276ccbcfa n/wpa_supplicant-2.10-x86_64-3.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg wpa_supplicant-2.10-i586-2_slack15.0.txz

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

35.9%