hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2019/09/12/6 - Mailing List, Mitigation, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/ - | |
References | () https://seclists.org/bugtraq/2019/Sep/56 - Mailing List, Third Party Advisory | |
References | () https://usn.ubuntu.com/4136-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4136-2/ - Third Party Advisory | |
References | () https://w1.fi/security/2019-7/ - Patch, Vendor Advisory | |
References | () https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt - Mitigation, Vendor Advisory | |
References | () https://www.debian.org/security/2019/dsa-4538 - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2019/09/11/7 - Mailing List, Mitigation, Third Party Advisory |
Information
Published : 2019-09-12 20:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16275
Mitre link : CVE-2019-16275
CVE.ORG link : CVE-2019-16275
JSON object : View
Products Affected
debian
- debian_linux
w1.fi
- wpa_supplicant
- hostapd
canonical
- ubuntu_linux
CWE
CWE-346
Origin Validation Error