Количество 13
Количество 13
CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network.
CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
CVE-2019-16275
CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect ...
GHSA-96gq-6rhf-g9x2
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
BDU:2019-04775
Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2021:0478-1
Security update for wpa_supplicant
openSUSE-SU-2021:0519-1
Security update for hostapd
SUSE-SU-2020:3424-1
Security update for wpa_supplicant
openSUSE-SU-2020:2059-1
Security update for wpa_supplicant
openSUSE-SU-2020:2053-1
Security update for wpa_supplicant
SUSE-SU-2020:3380-1
Security update for wpa_supplicant
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network. | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
CVSS3: 6.5 | 1% Низкий | больше 5 лет назад | ||
CVE-2019-16275 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect ... | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
GHSA-96gq-6rhf-g9x2 hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. | CVSS3: 6.5 | 1% Низкий | больше 3 лет назад | |
BDU:2019-04775 Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 1% Низкий | больше 6 лет назад | |
SUSE-SU-2021:0478-1 Security update for wpa_supplicant | почти 5 лет назад | |||
openSUSE-SU-2021:0519-1 Security update for hostapd | почти 5 лет назад | |||
SUSE-SU-2020:3424-1 Security update for wpa_supplicant | около 5 лет назад | |||
openSUSE-SU-2020:2059-1 Security update for wpa_supplicant | около 5 лет назад | |||
openSUSE-SU-2020:2053-1 Security update for wpa_supplicant | около 5 лет назад | |||
SUSE-SU-2020:3380-1 Security update for wpa_supplicant | около 5 лет назад |
Уязвимостей на страницу