Input validation error in wpa_supplicant and hostapd - CVE-2019-16275
Published: September 30, 2019 / Updated: September 30, 2019
wpa_supplicant
hostapd
Detailed vulnerability description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the affected software allows an incorrect indication of disconnection in certain situations because source address validation is mishandled. A remote attacker in radio range of the access point can send a specially crafted 802.11 frame and cause a denial of service condition on target system.
How to mitigate CVE-2019-16275
Sources
- http://www.openwall.com/lists/oss-security/2019/09/12/6
- https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html
- https://usn.ubuntu.com/4136-1/
- https://usn.ubuntu.com/4136-2/
- https://w1.fi/security/2019-7/
- https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
- https://www.openwall.com/lists/oss-security/2019/09/11/7