CVE-2017-15908
- EPSS 0.27%
- Veröffentlicht 26.10.2017 14:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected ser...
CVE-2017-15873
- EPSS 0.14%
- Veröffentlicht 24.10.2017 20:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The get_next_block function in archival/libarchive/decompress_bunzip2.c in BusyBox 1.27.2 has an Integer Overflow that may lead to a write access violation.
CVE-2017-13078
- EPSS 0.7%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the four-way handshake, allowing an attacker within radio range to replay frames from access points to clients.
CVE-2017-13079
- EPSS 0.35%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
CVE-2017-13080
- EPSS 0.82%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.
CVE-2017-13081
- EPSS 0.34%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
CVE-2017-13082
- EPSS 0.69%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11r allows reinstallation of the Pairwise Transient Key (PTK) Temporal Key (TK) during the fast BSS transmission (FT) handshake, allowing an attacker within radio range to replay, decrypt, ...
CVE-2017-13084
- EPSS 1.23%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
CVE-2017-13086
- EPSS 1.46%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Tunneled Direct-Link Setup (TDLS) Peer Key (TPK) during the TDLS handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
CVE-2017-13087
- EPSS 1.11%
- Veröffentlicht 17.10.2017 13:29:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
Wi-Fi Protected Access (WPA and WPA2) that support 802.11v allows reinstallation of the Group Temporal Key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame, allowing an attacker within radio range to replay frames f...