Логотип exploitDog
bind:CVE-2019-5061
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-5061

Количество 5

Количество 5

ubuntu логотип

CVE-2019-5061

около 6 лет назад

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-5061

около 6 лет назад

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2019-5061

около 6 лет назад

An exploitable denial-of-service vulnerability exists in the hostapd 2 ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-6626-64rf-2cvv

больше 3 лет назад

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2023-01659

больше 6 лет назад

Уязвимость клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с недостатками процедуры аутентификации, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-5061

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-5061

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

CVSS3: 6.5
0%
Низкий
около 6 лет назад
debian логотип
CVE-2019-5061

An exploitable denial-of-service vulnerability exists in the hostapd 2 ...

CVSS3: 6.5
0%
Низкий
около 6 лет назад
github логотип
GHSA-6626-64rf-2cvv

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

CVSS3: 6.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2023-01659

Уязвимость клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с недостатками процедуры аутентификации, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.5
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу