CWE
346
Advisory Published
CVE Published
Updated

CVE-2019-16275

First published: Thu Sep 12 2019(Updated: )

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
debian/wpa<=2:2.9-1<=2:2.4-1+deb9u4<=2:2.4-1<=2:2.7+git20190128+0c1e29f-6
2:2.9-2
2:2.7+git20190128+0c1e29f-6+deb10u1
W1.fi Hostapd<=2.9
W1.fi Wpa Supplicant<=2.9
Debian Debian Linux=8.0
Debian Debian Linux=10.0
Canonical Ubuntu Linux=12.04
Canonical Ubuntu Linux=14.04
Canonical Ubuntu Linux=16.04
Canonical Ubuntu Linux=18.04
Canonical Ubuntu Linux=19.04
ubuntu/wpa<2:2.6-15ubuntu2.5
2:2.6-15ubuntu2.5
ubuntu/wpa<2:2.6-21ubuntu3.3
2:2.6-21ubuntu3.3
ubuntu/wpa<2.1-0ubuntu1.7+
2.1-0ubuntu1.7+
ubuntu/wpa<2.4-0ubuntu6.6
2.4-0ubuntu6.6
debian/wpa
2:2.9.0-21+deb11u2
2:2.10-12+deb12u2
2:2.10-22

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2019-16275?

    CVE-2019-16275 is a vulnerability that allows an incorrect indication of disconnection in hostapd and wpa_supplicant due to mishandled source address validation, leading to a denial of service.

  • What is the severity of CVE-2019-16275?

    CVE-2019-16275 has a severity value of 6.5, which is considered medium.

  • Which software is affected by CVE-2019-16275?

    hostapd versions before 2.10 and wpa_supplicant versions before 2.10 are affected by CVE-2019-16275.

  • What is the remedy for CVE-2019-16275?

    To fix CVE-2019-16275, update hostapd to version 2.10 or later, and update wpa_supplicant to version 2.10 or later.

  • Where can I find more information about CVE-2019-16275?

    You can find more information about CVE-2019-16275 on the following references: [1] [2] [3].

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203