[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253928

 
 

909

 
 

198006

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2011:045 -- SUSE NetworkManager, wpa_supplicant, NetworkManager-gnome man in the middle

ID: oval:org.secpod.oval:def:400014Date: (C)2012-01-31   (M)2021-09-30
Class: PATCHFamily: unix




When 802.11X authentication is used NetworkManager did not pin a certificate"s subject to an ESSID. A rogue access point could therefore be used to conduct MITM attacks by using any other valid certificate issued by the same CA as used in the original network CVE-2006-7246. If password based authentication is used this means an attacker could sniff and potentially crack the password hashes of the victims. The certificate checks are only performed on newly created connections. Users must therefore delete and re-create any existing WPA Enterprise connections using e.g. nm-connection-editor to take advantage of the checks. knetworkmanager is also affected by but a fix is currently not available. Users of knetworkmanager are advised to use nm-applet for 802.11X networks instead. The following document gives a more detailed explanation about the problem in general. Administrators are advised to take the opportunity to review security of their wireless networks if 802.11X authentication is used

Platform:
openSUSE 11.3
Product:
NetworkManager
wpa_supplicant
NetworkManager-gnome
Reference:
SUSE-SA:2011:045
CVE-2006-7246
CVE    1
CVE-2006-7246
CPE    1
cpe:/o:opensuse:opensuse:11.3

© SecPod Technologies