aboutsummaryrefslogtreecommitdiff
path: root/share/security/advisories/FreeBSD-SA-18:11.hostapd.asc
diff options
context:
space:
mode:
Diffstat (limited to 'share/security/advisories/FreeBSD-SA-18:11.hostapd.asc')
-rw-r--r--share/security/advisories/FreeBSD-SA-18:11.hostapd.asc159
1 files changed, 0 insertions, 159 deletions
diff --git a/share/security/advisories/FreeBSD-SA-18:11.hostapd.asc b/share/security/advisories/FreeBSD-SA-18:11.hostapd.asc
deleted file mode 100644
index 9aad35b17b..0000000000
--- a/share/security/advisories/FreeBSD-SA-18:11.hostapd.asc
+++ /dev/null
@@ -1,159 +0,0 @@
------BEGIN PGP SIGNED MESSAGE-----
-Hash: SHA512
-
-=============================================================================
-FreeBSD-SA-18:11.hostapd Security Advisory
- The FreeBSD Project
-
-Topic: Unauthenticated EAPOL-Key Decryption Vulnerability
-
-Category: contrib
-Module: wpa
-Announced: 2018-08-14
-Credits: Mathy Vanhoef of the imec-DistriNet research group of
- KU Leuven
-Affects: All supported versions of FreeBSD.
-Corrected: 2018-08-15 05:03:54 UTC (stable/11, 11.1-STABLE)
- 2018-08-15 02:30:11 UTC (releng/11.2, 11.2-RELEASE-p2)
- 2018-08-15 02:30:11 UTC (releng/11.1, 11.1-RELEASE-p13)
- 2018-08-15 05:05:02 UTC (stable/10, 10.4-STABLE)
- 2018-08-15 02:31:10 UTC (releng/10.4, 10.4-RELEASE-p11)
-CVE Name: CVE-2018-14526
-
-For general information regarding FreeBSD Security Advisories,
-including descriptions of the fields above, security branches, and the
-following sections, please visit <URL:https://security.FreeBSD.org/>.
-
-I. Background
-
-The wpa_supplicant(8) utility is a client (supplicant) with support for WPA
-and WPA2 (IEEE 802.11i / RSN). It is suitable for both desktop and laptop
-computers as well as embedded systems. Supplicant is the IEEE 802.1X/WPA
-component that is used in the client stations. It implements key negotiation
-with a WPA Authenticator and it controls the roaming and IEEE 802.11
-authentication/association of the wlan(4) driver.
-
-The wpa_supplicant(8) utility is designed to be a "daemon" program that runs
-in the background and acts as the backend component controlling the wireless
-connection. The wpa_supplicant(8) utility supports separate frontend programs
-and a text-based frontend (wpa_cli(8)) and a GUI (wpa_gui) are included with
-wpa_supplicant(8).
-
-II. Problem Description
-
-When using WPA2, EAPOL-Key frames with the Encrypted flag and without the MIC
-flag set, the data field was decrypted first without verifying the MIC. When
-the dta field was encrypted using RC4, for example, when negotiating TKIP as
-a pairwise cipher, the unauthenticated but decrypted data was subsequently
-processed. This opened wpa_supplicant(8) to abuse by decryption and recovery
-of sensitive information contained in EAPOL-Key messages.
-
-See https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
-for a detailed description of the bug.
-
-III. Impact
-
-All users of the WPA2 TKIP pairwise cipher are vulnerable to information, for
-example, the group key.
-
-IV. Workaround
-
-Remove TKIP as an allowed pairwise cipher in RSN/WPA2 networks in
-wpa_supplicant.conf(5) by changing 'pairwise=CCMP TKIP' to 'pariwise=CCMP'.
-
-This can also be mitigated by removing TKIP as a cipher on the AP.
-
-Systems and users who do not use WPA2 TKIP are not affected.
-
-V. Solution
-
-Perform one of the following:
-
-1) Upgrade your vulnerable system to a supported FreeBSD stable or
-release / security branch (releng) dated after the correction date.
-
-2) To update your vulnerable system via a binary patch:
-
-Systems running a RELEASE version of FreeBSD on the i386 or amd64
-platforms can be updated via the freebsd-update(8) utility:
-
-# freebsd-update fetch
-# freebsd-update install
-
-3) To update your vulnerable system via a source code patch:
-
-The following patches have been verified to apply to the applicable
-FreeBSD release branches.
-
-a) Download the relevant patch from the location below, and verify the
-detached PGP signature using your PGP utility.
-
-[FreeBSD 11.x]
-# fetch https://security.FreeBSD.org/patches/SA-18:11/hostapd.patch
-# fetch https://security.FreeBSD.org/patches/SA-18:11/hostapd.patch.asc
-# gpg --verify hostapd.patch.asc
-
-[FreeBSD 10.4]
-# fetch https://security.FreeBSD.org/patches/SA-18:11/hostapd-10.patch
-# fetch https://security.FreeBSD.org/patches/SA-18:11/hostapd-10.patch.asc
-# gpg --verify hostapd-10.patch.asc
-
-b) Apply the patch. Execute the following commands as root:
-
-# cd /usr/src
-# patch < /path/to/patch
-
-c) Recompile the operating system using buildworld and installworld as
-described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.
-
-Restart the applicable daemons, or reboot the system.
-
-VI. Correction details
-
-The following list contains the correction revision numbers for each
-affected branch.
-
-Branch/path Revision
-- -------------------------------------------------------------------------
-stable/10/ r337832
-releng/10.4/ r337829
-stable/11/ r337831
-releng/11.1/ r337828
-releng/11.2/ r337828
-- -------------------------------------------------------------------------
-
-To see which files were modified by a particular revision, run the
-following command, replacing NNNNNN with the revision number, on a
-machine with Subversion installed:
-
-# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
-
-Or visit the following URL, replacing NNNNNN with the revision number:
-
-<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>
-
-VII. References
-
-<URL:https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt>
-
-<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526>
-
-The latest revision of this advisory is available at
-<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.hostapd.asc>
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.2.9 (FreeBSD)
-
-iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAltztf8ACgkQ05eS9J6n
-5cJ2kRAAiuef2NM6sG/OJhjIi3zTNZRTmO2S7BcaD8w7RDmH0rp1XPzTRs8CyWxo
-zLfoubOwIucS1nQGHHYhwTYSXw7lFvGWbebuzhNcEUOc8a1TrpLlyinqF8KDgfNd
-RSkTR1OTF91BEjlYKjuIFKUZ6OxUCpgUrprneEyn5wV/0eLkRv3VNqUuAwkTqU/i
-X7pnFd2BXPpvKTatefpGjnYmo3j3oJSiQeXcPM9zgcm6n9ZD+KiC48vdvbZGmERt
-HsMzUy0Z+OehKMJ+RvemWTiEwEFO7BK/FFgGH8LAgrwd0xff2RDU7S0NeCd+p76g
-y98aUg0WF6RqHXU/xHeHpljHxzrWP3Msb56NqB+phFuEKvVoVimGL54P6/sBSbq+
-eACFcTUcf88MLry41zKBchSmekzSdzeV1S6kQGG74W7DfYY/UdF/4ves/eNqO13l
-J5PjjusPn5IS+IP1omA6imJNHoEUrKR4ZW6KXZEfF7NdtcLGRebrAGySdqD0jHPP
-23fkVQRmEL23fwtlONxNhvrF/oA09/oHS++MUEUxF6b6BRyq0sQ/aBXU5GpoI8VQ
-5nDcASCloson18oA91T125bwD1bt6yLeTaFWhRJj6eeEI5HcJchZ9m1kGflNxEO9
-vM6bvIEPmF1IcR304i1os2JMgWHOAtOKxlsZpnwGs9U0qJu9/nw=
-=34YE
------END PGP SIGNATURE-----