Логотип exploitDog
bind:CVE-2019-16275
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-16275

Количество 13

Количество 13

ubuntu логотип

CVE-2019-16275

около 6 лет назад

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2019-16275

около 6 лет назад

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-16275

около 6 лет назад

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2019-16275

около 5 лет назад

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-16275

около 6 лет назад

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-96gq-6rhf-g9x2

больше 3 лет назад

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2019-04775

около 6 лет назад

Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:0478-1

больше 4 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:0519-1

больше 4 лет назад

Security update for hostapd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3424-1

почти 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2059-1

почти 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2053-1

почти 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:3380-1

почти 5 лет назад

Security update for wpa_supplicant

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-16275

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
redhat логотип
CVE-2019-16275

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-16275

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
msrc логотип
CVSS3: 6.5
0%
Низкий
около 5 лет назад
debian логотип
CVE-2019-16275

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect ...

CVSS3: 6.5
0%
Низкий
около 6 лет назад
github логотип
GHSA-96gq-6rhf-g9x2

hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-04775

Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2021:0478-1

Security update for wpa_supplicant

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2021:0519-1

Security update for hostapd

больше 4 лет назад
suse-cvrf логотип
SUSE-SU-2020:3424-1

Security update for wpa_supplicant

почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2059-1

Security update for wpa_supplicant

почти 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2053-1

Security update for wpa_supplicant

почти 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:3380-1

Security update for wpa_supplicant

почти 5 лет назад

Уязвимостей на страницу