• June 18, 2018, 02:21:04 PM
  • Welcome, Guest
Please login or register.

Login with username, password and session length
Advanced search  

News:

This Forum Beta is ONLY for registered owners of D-Link products in the USA for which we have created boards at this time.

Author Topic: DIR-878 FW v1.02 Build 02 Beta Security Release - NA Region Only!  (Read 841 times)

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 45143
  • D-Link Global Forum Moderator
    • New DIR-890L Router with SmartConnect™ Technology

Firmware:   v1.02B01   11/30/2017 NA Region Only
Revision Info: Beta FW version
Problems Resolved:
Note:
This release is to patch the WPA2 Key Reinstallation Attack (KRACK) Security Vulnerabilities affecting this product.
The beta firmware will be followed up by a fully quality test release in approximately 4 weeks.

A WPA2 wireless protocol vulnerability was reported to CERT//CC and public disclosed as: VU#228519 - Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse.
The following CVE IDs have been assigned to VU#228519. These vulnerabilities in the WPA2 protocol:
• CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake
• CVE-2017-13078: reinstallation of the group key in the Four-way handshake
• CVE-2017-13079: reinstallation of the integrity group key in the Four-way handshake
• CVE-2017-13080: reinstallation of the group key in the Group Key handshake
• CVE-2017-13081: reinstallation of the integrity group key in the Group Key handshake
• CVE-2017-13082: accepting a retransmitted Fast BSS Transition Re-association Request and reinstalling the pairwise key while processing it
• CVE-2017-13084: reinstallation of the STK key in the PeerKey handshake
• CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake
• CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
• CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
This patch also included fixes for DNSmasq vulnerability:
• CVE-2017-14491 – Remote code execution in the DNS subsystem that can be exploited from the other side of the internet against public-facing systems and against stuff on the local network. The previously latest version had a two-byte overflow bug, which could be leveraged, and all prior builds had an unlimited overflow.
• CVE-2017-14492 – The second remote code execution flaw works via a heap-based overflow.
• CVE-2017-14493 – Google labels this one as trivial to exploit. It's a stack-based buffer overflow vulnerability that enables remote code execution if it's used in conjunction with the flaw below.
• CVE-2017-14494 – This is an information leak in DHCP which, when using in conjunction with CVE-2017-14493, lets an attacker bypass the security mechanism ASLR and attempt to run code on a target system.
• CVE-2017-14495 – A limited flaw this one, but can be exploited to launch a denial of service attack by exhausting memory. Dnsmasq is only vulnerable, however, if the command line switches --add-mac, --add-cpe-id or --add-subnet are used.
• CVE-2017-14496 – Here the DNS code performs invalid boundary checks, allowing a system to be crashed using an integer underflow leading to a huge memcpy() call. Android systems are affected if the attacker is local or tethered directly to the device.
• CVE-2017-13704 – A large DNS query can crash the software

Enhancements:
None.

Known Issues:
None

NOTE: If your DIR-878 router is working with out any issues, it's recommended to keep the current version of FW that is loaded unless your are effected by one of the fixes.

IF IT WORKS, DON'T FIX IT!!!  ::)

Get it here:
NA Region-
DIR-878

Please follow the>FW Update Process to ensure a good FW upgrade is performed.

Let us know how it works for you...

« Last Edit: March 14, 2018, 07:25:31 AM by GreenBay42 »
Logged
Cable:200mb/10Mb>Motorola MB7420>COVR3902>HP 24pt Gb Switch. 3xDGL-4500s,DIR-857,835,827,815,890L,880L,868L,865L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L and 960L.
Go Here>Router Troubleshooting

GreenBay42

  • Administrator
  • Level 6 Member
  • *
  • Posts: 978
Re: New - DIR-878 FW v1.02 Build 02 Beta Security Release - NA Region Only!
« Reply #1 on: December 18, 2017, 12:27:49 PM »

This firmware uses "firmware encryption" so you will not be able to downgrade to older versions unless you perform an emergency recovery.
Logged

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 45143
  • D-Link Global Forum Moderator
    • New DIR-890L Router with SmartConnect™ Technology
Re: New - DIR-878 FW v1.02 Build 02 Beta Security Release - NA Region Only!
« Reply #2 on: December 18, 2017, 12:29:04 PM »

Thank you. Hopefully the recovery won't be needed.  ::)
Logged
Cable:200mb/10Mb>Motorola MB7420>COVR3902>HP 24pt Gb Switch. 3xDGL-4500s,DIR-857,835,827,815,890L,880L,868L,865L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L and 960L.
Go Here>Router Troubleshooting

GreenBay42

  • Administrator
  • Level 6 Member
  • *
  • Posts: 978
Re: New - DIR-878 FW v1.02 Build 02 Beta Security Release - NA Region Only!
« Reply #3 on: December 18, 2017, 12:38:20 PM »

Hopefully  :-\   But these KRACK patches are BETA. They are all going through the official release process now (testing, certification, $$$, etc)
Logged

FurryNutz

  • Poweruser
  •   ▲
    ▲ ▲
  • *****
  • Posts: 45143
  • D-Link Global Forum Moderator
    • New DIR-890L Router with SmartConnect™ Technology
Re: New - DIR-878 FW v1.02 Build 02 Beta Security Release - NA Region Only!
« Reply #4 on: December 18, 2017, 01:07:53 PM »

 ;)
Logged
Cable:200mb/10Mb>Motorola MB7420>COVR3902>HP 24pt Gb Switch. 3xDGL-4500s,DIR-857,835,827,815,890L,880L,868L,865L,836L,810L,685,657,3x655s,645,628,601,DNR-202L,DNS-345,DCS-933L,936L and 960L.
Go Here>Router Troubleshooting