2019-09-12 20:00:50 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2019-16275" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"url" : "https://www.openwall.com/lists/oss-security/2019/09/11/7" ,
"refsource" : "MISC" ,
"name" : "https://www.openwall.com/lists/oss-security/2019/09/11/7"
} ,
{
"url" : "https://w1.fi/security/2019-7/" ,
"refsource" : "MISC" ,
"name" : "https://w1.fi/security/2019-7/"
} ,
{
"url" : "https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt" ,
"refsource" : "MISC" ,
"name" : "https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt"
2019-09-12 21:00:49 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20190912 Re: hostapd/wpa_supplicant: AP mode PMF disconnection protection bypass" ,
"url" : "http://www.openwall.com/lists/oss-security/2019/09/12/6"
2019-09-16 18:00:57 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html"
2019-09-18 16:01:05 +00:00
} ,
{
"refsource" : "UBUNTU" ,
"name" : "USN-4136-1" ,
"url" : "https://usn.ubuntu.com/4136-1/"
2019-09-18 17:01:00 +00:00
} ,
{
"refsource" : "UBUNTU" ,
"name" : "USN-4136-2" ,
"url" : "https://usn.ubuntu.com/4136-2/"
2019-09-29 23:00:57 +00:00
} ,
{
"refsource" : "DEBIAN" ,
"name" : "DSA-4538" ,
"url" : "https://www.debian.org/security/2019/dsa-4538"
2019-09-30 06:01:05 +00:00
} ,
{
"refsource" : "BUGTRAQ" ,
"name" : "20190929 [SECURITY] [DSA 4538-1] wpa security update" ,
"url" : "https://seclists.org/bugtraq/2019/Sep/56"
2019-11-07 03:01:21 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-0e0b28001d" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/"
2019-11-09 23:01:28 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-740834c559" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/"
2019-11-10 01:01:31 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-2265b5ae86" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/"
2019-11-15 05:01:07 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-65509aac53" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/"
2019-11-17 19:01:45 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-2bdcccee3c" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/"
2019-09-12 20:00:50 +00:00
}
]
}
}