Логотип exploitDog
bind:CVE-2019-9496
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-9496

Количество 7

Количество 7

ubuntu логотип

CVE-2019-9496

почти 7 лет назад

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2019-9496

почти 7 лет назад

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2019-9496

почти 7 лет назад

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2019-9496

почти 7 лет назад

An invalid authentication sequence could result in the hostapd process ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-cvwc-47mg-vx9r

больше 3 лет назад

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2021-05847

почти 7 лет назад

Уязвимость реализации SAE функции wpa_supplicant сертификации устройств беспроводной связи WPA, связанная с недостатками процедуры аутентификации, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0222-1

почти 6 лет назад

Security update for hostapd

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-9496

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS3: 7.5
2%
Низкий
почти 7 лет назад
redhat логотип
CVE-2019-9496

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS3: 6.5
2%
Низкий
почти 7 лет назад
nvd логотип
CVE-2019-9496

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS3: 7.5
2%
Низкий
почти 7 лет назад
debian логотип
CVE-2019-9496

An invalid authentication sequence could result in the hostapd process ...

CVSS3: 7.5
2%
Низкий
почти 7 лет назад
github логотип
GHSA-cvwc-47mg-vx9r

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

CVSS3: 7.5
2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-05847

Уязвимость реализации SAE функции wpa_supplicant сертификации устройств беспроводной связи WPA, связанная с недостатками процедуры аутентификации, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
2%
Низкий
почти 7 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0222-1

Security update for hostapd

почти 6 лет назад

Уязвимостей на страницу