0001-WPA-Ignore-unauthenticated-encrypted-EAPOL-Key-data.patch 1.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243
  1. From 3e34cfdff6b192fe337c6fb3f487f73e96582961 Mon Sep 17 00:00:00 2001
  2. From: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
  3. Date: Sun, 15 Jul 2018 01:25:53 +0200
  4. Subject: [PATCH] WPA: Ignore unauthenticated encrypted EAPOL-Key data
  5. Ignore unauthenticated encrypted EAPOL-Key data in supplicant
  6. processing. When using WPA2, these are frames that have the Encrypted
  7. flag set, but not the MIC flag.
  8. When using WPA2, EAPOL-Key frames that had the Encrypted flag set but
  9. not the MIC flag, had their data field decrypted without first verifying
  10. the MIC. In case the data field was encrypted using RC4 (i.e., when
  11. negotiating TKIP as the pairwise cipher), this meant that
  12. unauthenticated but decrypted data would then be processed. An adversary
  13. could abuse this as a decryption oracle to recover sensitive information
  14. in the data field of EAPOL-Key messages (e.g., the group key).
  15. (CVE-2018-14526)
  16. Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
  17. ---
  18. src/rsn_supp/wpa.c | 11 +++++++++++
  19. 1 file changed, 11 insertions(+)
  20. --- a/src/rsn_supp/wpa.c
  21. +++ b/src/rsn_supp/wpa.c
  22. @@ -2157,6 +2157,17 @@ int wpa_sm_rx_eapol(struct wpa_sm *sm, c
  23. if ((sm->proto == WPA_PROTO_RSN || sm->proto == WPA_PROTO_OSEN) &&
  24. (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) && mic_len) {
  25. + /*
  26. + * Only decrypt the Key Data field if the frame's authenticity
  27. + * was verified. When using AES-SIV (FILS), the MIC flag is not
  28. + * set, so this check should only be performed if mic_len != 0
  29. + * which is the case in this code branch.
  30. + */
  31. + if (!(key_info & WPA_KEY_INFO_MIC)) {
  32. + wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
  33. + "WPA: Ignore EAPOL-Key with encrypted but unauthenticated data");
  34. + goto out;
  35. + }
  36. if (wpa_supplicant_decrypt_key_data(sm, key, mic_len,
  37. ver, key_data,
  38. &key_data_len))