Aggiornamento Alert GCSA-17062 - Vulnerabilita' nel protocollo WPA2 (KRACK - Key Reinstallation Attacks)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID: Aggiornamento Alert GCSA-17062
Data: 25 ottobre 2017
Titolo: Vulnerabilita' nel protocollo WPA2 (KRACK - Key Reinstallation Attacks)
******************************************************************
Segnaliamo ulteriori riferimenti in aggiornamento all'Alert GCSA-17062
del 16 Ottobre 2017.
:: Riferimenti
CERT.org Vulnerability Note VU#228519
https://www.kb.cert.org/vuls/id/228519/
SecurityFocus
http://www.securityfocus.com/bid/101274
WPA2 "KRACK" Attack
https://isc.sans.edu/diary/rss/22932
KRACK Attack - What to Communicate
https://securingthehuman.sans.org/blog/2017/10/16/28748/
Test Script Available for KRACK Vulnerability
https://github.com/vanhoefm/krackattacks-test-ap-ft
Oracle ELSA-2017-2911 - wpa_supplicant security update
https://linux.oracle.com/errata/ELSA-2017-2911.html
Oracle ELSA-2017-2907 - wpa_supplicant security update
https://linux.oracle.com/errata/ELSA-2017-2907.html
RHSA-2017:2911 - Security Advisory
https://access.redhat.com/errata/RHSA-2017:2911
RHSA-2017:2907 - Security Advisory
https://access.redhat.com/errata/RHSA-2017:2907
FreeBSD Security Advisory
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:07.wpa.asc
Ubuntu Security Notice USN-3455-1
https://usn.ubuntu.com/usn/usn-3455-1/
Debian Security Advisory
https://www.debian.org/security/2017/dsa-3999
Slackware Security Advisories
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware-security.592891
Windows Wireless WPA Group Key Reinstallation Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
Intel
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&languageid=en-fr
Aerohive's Response to "KRACK" (Oct 16, 2017)
https://www3.aerohive.com/support/security-bulletins/Product-Security-Announcement-Aerohives-Response-to-KRACK-10162017.html
Aruba Networks - WPA2 Key Reinstallation Vulnerabilities
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
Juniper Networks -Multiple vulnerabilities in Wi-Fi Protected Access protocols
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10827
Cisco Security Advisory cisco-sa-20171016-wpa
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
Fortinet Advisory FG-IR-17-196
http://fortiguard.com/psirt/FG-IR-17-196
w1.fi Security advisories
http://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAlnwrNAACgkQwZxMk2USYEIEWwCfU4jYFr0WTj9tfZ2sqzB/h1US
r08AoIX+67XKyDKYx1KBS1nzyjUdcXUw
=0qPN
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID: Aggiornamento Alert GCSA-17062
Data: 25 ottobre 2017
Titolo: Vulnerabilita' nel protocollo WPA2 (KRACK - Key Reinstallation Attacks)
******************************************************************
Segnaliamo ulteriori riferimenti in aggiornamento all'Alert GCSA-17062
del 16 Ottobre 2017.
:: Riferimenti
CERT.org Vulnerability Note VU#228519
https://www.kb.cert.org/vuls/id/228519/
SecurityFocus
http://www.securityfocus.com/bid/101274
WPA2 "KRACK" Attack
https://isc.sans.edu/diary/rss/22932
KRACK Attack - What to Communicate
https://securingthehuman.sans.org/blog/2017/10/16/28748/
Test Script Available for KRACK Vulnerability
https://github.com/vanhoefm/krackattacks-test-ap-ft
Oracle ELSA-2017-2911 - wpa_supplicant security update
https://linux.oracle.com/errata/ELSA-2017-2911.html
Oracle ELSA-2017-2907 - wpa_supplicant security update
https://linux.oracle.com/errata/ELSA-2017-2907.html
RHSA-2017:2911 - Security Advisory
https://access.redhat.com/errata/RHSA-2017:2911
RHSA-2017:2907 - Security Advisory
https://access.redhat.com/errata/RHSA-2017:2907
FreeBSD Security Advisory
https://www.freebsd.org/security/advisories/FreeBSD-SA-17:07.wpa.asc
Ubuntu Security Notice USN-3455-1
https://usn.ubuntu.com/usn/usn-3455-1/
Debian Security Advisory
https://www.debian.org/security/2017/dsa-3999
Slackware Security Advisories
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware-security.592891
Windows Wireless WPA Group Key Reinstallation Vulnerability
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-13080
Intel
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00101&languageid=en-fr
Aerohive's Response to "KRACK" (Oct 16, 2017)
https://www3.aerohive.com/support/security-bulletins/Product-Security-Announcement-Aerohives-Response-to-KRACK-10162017.html
Aruba Networks - WPA2 Key Reinstallation Vulnerabilities
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt
Juniper Networks -Multiple vulnerabilities in Wi-Fi Protected Access protocols
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10827
Cisco Security Advisory cisco-sa-20171016-wpa
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa
Fortinet Advisory FG-IR-17-196
http://fortiguard.com/psirt/FG-IR-17-196
w1.fi Security advisories
http://w1.fi/security/2017-1/wpa-packet-number-reuse-with-replayed-messages.txt
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAlnwrNAACgkQwZxMk2USYEIEWwCfU4jYFr0WTj9tfZ2sqzB/h1US
r08AoIX+67XKyDKYx1KBS1nzyjUdcXUw
=0qPN
-----END PGP SIGNATURE-----