SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   OpenBSD Kernel Vendors:   OpenBSD
OpenBSD Wifi WPA1/WPA2 Protocol Implementation Flaw Lets Remote Users Access and Modify Wifi Sessio Data
SecurityTracker Alert ID:  1037948
SecurityTracker URL:  http://securitytracker.com/id/1037948
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 2 2017
Impact:   Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.9, 6.0
Description:   A vulnerability was reported in OpenBSD. A remote user can conduct a man-in-the-middle attack to access Wifi session data.

A remote user that can conduct a man-in-the-middle attack against the target OpenBSD wifi client using WPA1 or WPA2 can exploit a protocol implementation flaw and cause the target client to send and receive unencrypted frames.

OpenBSD clients are affected. OpenBSD access points are not affected affected.

Mathy Vanhoef reported this vulnerability.

Impact:   A remote user that can conduct a man-in-the-middle attack against the WPA1/WPA2 Wifi connection can access and modify data Wifi session data.
Solution:   The vendor has issued a source code fix, available at:

https://ftp.openbsd.org/pub/OpenBSD/patches/5.9/common/035_net80211.patch.sig
https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/018_net80211.patch.sig

The vendor advisories are available at:

https://www.openbsd.org/errata59.html
https://www.openbsd.org/errata60.html

Vendor URL:  www.openbsd.org/errata60.html (Links to External Site)
Cause:   State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC