Release Date: | 2017-10-16 |
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of theTunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
See more information about CVE-2017-13086 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.
Base Score: | 5.4 | Base Metrics: | AV:A/AC:M/Au:N/C:P/I:P/A:P |
Access Vector: | Adjacent network | Attack Complexity: | Medium |
Authentication: | None required | Confidentiality Impact: | Partial |
Integrity Impact: | Partial | Availability Impact: | Partial |
Platform | Errata | Release Date |
Oracle Linux version 7 (wpa_supplicant) | ELSA-2017-2907 | 2017-10-17 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team