[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4450-1 wpa -- wpa

ID: oval:org.secpod.oval:def:55306Date: (C)2019-06-21   (M)2022-11-30
Class: PATCHFamily: unix




A vulnerability was found in the WPA protocol implementation found in wpa_supplication and hostapd . The EAP-pwd implementation in hostapd and wpa_supplicant doesn"t properly validate fragmentation reassembly state when receiving an unexpected fragment. This could lead to a process crash due to a NULL pointer derefrence. An attacker in radio range of a station or access point with EAP-pwd support could cause a crash of the relevant process , ensuring a denial of service.

Platform:
Linux Mint 3
Product:
hostapd
wpagui
wpasupplicant
Reference:
DSA-4450-1
CVE-2019-11555
CVE    1
CVE-2019-11555
CPE    46
cpe:/a:w1.fi:wpasupplicant
cpe:/a:w1.fi:hostapd:0.6.7
cpe:/a:w1.fi:hostapd:0.6.6
cpe:/a:w1.fi:hostapd:0.4.6
...

© SecPod Technologies