D-Link Wireless Routers for Home and Small Business > DIR-878

DIR-878 FW v1.02 Build 02 Beta Security Release - NA Region Only!

(1/1)

FurryNutz:
Firmware:   v1.02B01   11/30/2017 NA Region Only
Revision Info: Beta FW version
Problems Resolved:
Note:
This release is to patch the WPA2 Key Reinstallation Attack (KRACK) Security Vulnerabilities affecting this product.
The beta firmware will be followed up by a fully quality test release in approximately 4 weeks.

A WPA2 wireless protocol vulnerability was reported to CERT//CC and public disclosed as: VU#228519 - Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse.
The following CVE IDs have been assigned to VU#228519. These vulnerabilities in the WPA2 protocol:
CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake
CVE-2017-13078: reinstallation of the group key in the Four-way handshake
CVE-2017-13079: reinstallation of the integrity group key in the Four-way handshake
CVE-2017-13080: reinstallation of the group key in the Group Key handshake
CVE-2017-13081: reinstallation of the integrity group key in the Group Key handshake
CVE-2017-13082: accepting a retransmitted Fast BSS Transition Re-association Request and reinstalling the pairwise key while processing it
CVE-2017-13084: reinstallation of the STK key in the PeerKey handshake
CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake
CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
This patch also included fixes for DNSmasq vulnerability:
CVE-2017-14491 Remote code execution in the DNS subsystem that can be exploited from the other side of the internet against public-facing systems and against stuff on the local network. The previously latest version had a two-byte overflow bug, which could be leveraged, and all prior builds had an unlimited overflow.
CVE-2017-14492 The second remote code execution flaw works via a heap-based overflow.
CVE-2017-14493 Google labels this one as trivial to exploit. It's a stack-based buffer overflow vulnerability that enables remote code execution if it's used in conjunction with the flaw below.
CVE-2017-14494 This is an information leak in DHCP which, when using in conjunction with CVE-2017-14493, lets an attacker bypass the security mechanism ASLR and attempt to run code on a target system.
CVE-2017-14495 A limited flaw this one, but can be exploited to launch a denial of service attack by exhausting memory. Dnsmasq is only vulnerable, however, if the command line switches --add-mac, --add-cpe-id or --add-subnet are used.
CVE-2017-14496 Here the DNS code performs invalid boundary checks, allowing a system to be crashed using an integer underflow leading to a huge memcpy() call. Android systems are affected if the attacker is local or tethered directly to the device.
CVE-2017-13704 A large DNS query can crash the software

Enhancements:
None.

Known Issues:
None

NOTE: If your DIR-878 router is working with out any issues, it's recommended to keep the current version of FW that is loaded unless your are effected by one of the fixes.

IF IT WORKS, DON'T FIX IT!!!  ::)

Get it here:
NA Region-
DIR-878

Please follow the>FW Update Process to ensure a good FW upgrade is performed.

Let us know how it works for you...

GreenBay42:
This firmware uses "firmware encryption" so you will not be able to downgrade to older versions unless you perform an emergency recovery.

FurryNutz:
Thank you. Hopefully the recovery won't be needed.  ::)

GreenBay42:
Hopefully  :-\   But these KRACK patches are BETA. They are all going through the official release process now (testing, certification, $$$, etc)

FurryNutz:
 ;)

Navigation

[0] Message Index

Go to full version