CVE-2019-5061

Source
https://nvd.nist.gov/vuln/detail/CVE-2019-5061
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-5061.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-5061
Related
Published
2019-12-12T22:15:11Z
Modified
2024-11-21T04:44:16Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

References

Affected packages

Debian:11 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.9+git20200213+877d9a0-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.9+git20200213+877d9a0-1

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / wpa

Package

Name
wpa
Purl
pkg:deb/debian/wpa?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.9+git20200213+877d9a0-1

Ecosystem specific

{
    "urgency": "unimportant"
}