6.5

CVE-2019-16275

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
W1.FiHostapd Version <= 2.9
W1.FiWpa Supplicant Version <= 2.9
DebianDebian Linux Version8.0
DebianDebian Linux Version10.0
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.52% 0.662
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 3.3 6.5 2.9
AV:A/AC:L/Au:N/C:N/I:N/A:P
CWE-346 Origin Validation Error

The product does not properly verify that the source of data or communication is valid.

https://seclists.org/bugtraq/2019/Sep/56
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2019/09/12/6
Third Party Advisory
Mailing List
Mitigation
https://usn.ubuntu.com/4136-1/
Third Party Advisory
https://usn.ubuntu.com/4136-2/
Third Party Advisory
https://w1.fi/security/2019-7/
Patch
Vendor Advisory
https://www.openwall.com/lists/oss-security/2019/09/11/7
Third Party Advisory
Mailing List
Mitigation