Количество 13
Количество 13

CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network.

CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CVE-2019-16275
CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect ...
GHSA-96gq-6rhf-g9x2
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

BDU:2019-04775
Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2021:0478-1
Security update for wpa_supplicant

openSUSE-SU-2021:0519-1
Security update for hostapd

SUSE-SU-2020:3424-1
Security update for wpa_supplicant

openSUSE-SU-2020:2059-1
Security update for wpa_supplicant

openSUSE-SU-2020:2053-1
Security update for wpa_supplicant

SUSE-SU-2020:3380-1
Security update for wpa_supplicant
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network. | CVSS3: 6.5 | 0% Низкий | около 6 лет назад |
![]() | CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. | CVSS3: 6.5 | 0% Низкий | около 6 лет назад |
![]() | CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. | CVSS3: 6.5 | 0% Низкий | около 6 лет назад |
![]() | CVSS3: 6.5 | 0% Низкий | около 5 лет назад | |
CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect ... | CVSS3: 6.5 | 0% Низкий | около 6 лет назад | |
GHSA-96gq-6rhf-g9x2 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
![]() | BDU:2019-04775 Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | около 6 лет назад |
![]() | SUSE-SU-2021:0478-1 Security update for wpa_supplicant | больше 4 лет назад | ||
![]() | openSUSE-SU-2021:0519-1 Security update for hostapd | больше 4 лет назад | ||
![]() | SUSE-SU-2020:3424-1 Security update for wpa_supplicant | почти 5 лет назад | ||
![]() | openSUSE-SU-2020:2059-1 Security update for wpa_supplicant | почти 5 лет назад | ||
![]() | openSUSE-SU-2020:2053-1 Security update for wpa_supplicant | почти 5 лет назад | ||
![]() | SUSE-SU-2020:3380-1 Security update for wpa_supplicant | почти 5 лет назад |
Уязвимостей на страницу