Show filters
92 Total Results
Displaying 11-20 of 92
Sort by:
Attacker Value
Unknown
CVE-2017-17805
Disclosure Date: December 20, 2017 (last updated November 26, 2024)
The Salsa20 encryption algorithm in the Linux kernel before 4.14.8 does not correctly handle zero-length inputs, allowing a local attacker able to use the AF_ALG-based skcipher interface (CONFIG_CRYPTO_USER_API_SKCIPHER) to cause a denial of service (uninitialized-memory free and kernel crash) or have unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 were vulnerable.
0
Attacker Value
Unknown
CVE-2017-17806
Disclosure Date: December 20, 2017 (last updated November 26, 2024)
The HMAC implementation (crypto/hmac.c) in the Linux kernel before 4.14.8 does not validate that the underlying cryptographic hash algorithm is unkeyed, allowing a local attacker able to use the AF_ALG-based hash interface (CONFIG_CRYPTO_USER_API_HASH) and the SHA-3 hash algorithm (CONFIG_CRYPTO_SHA3) to cause a kernel stack buffer overflow by executing a crafted sequence of system calls that encounter a missing SHA-3 initialization.
0
Attacker Value
Unknown
CVE-2016-1254
Disclosure Date: December 05, 2017 (last updated November 08, 2023)
Tor before 0.2.8.12 might allow remote attackers to cause a denial of service (client crash) via a crafted hidden service descriptor.
0
Attacker Value
Unknown
CVE-2017-13088
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Integrity Group Temporal Key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13084
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown
CVE-2017-13086
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown
CVE-2017-13081
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13082
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
0
Attacker Value
Unknown
CVE-2017-13079
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
0
Attacker Value
Unknown
CVE-2017-13087
Disclosure Date: October 17, 2017 (last updated November 26, 2024)
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames from access points to clients.
0