Name | CVE-2019-5061 |
Description | An exploitable denial-of-service vulnerability exists in the hostapd 2.6, where an attacker could trigger AP to send IAPP location updates for stations, before the required authentication process has completed. This could lead to different denial of service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby Aps of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
wpa (PTS) | jessie, jessie (lts) | 2.3-1+deb8u15 | vulnerable |
stretch (security) | 2:2.4-1+deb9u9 | vulnerable | |
stretch (lts), stretch | 2:2.4-1+deb9u11 | vulnerable | |
buster, buster (lts) | 2:2.7+git20190128+0c1e29f-6+deb10u5 | vulnerable | |
buster (security) | 2:2.7+git20190128+0c1e29f-6+deb10u4 | vulnerable | |
bullseye (security), bullseye | 2:2.9.0-21+deb11u2 | fixed | |
bookworm (security), bookworm | 2:2.10-12+deb12u2 | fixed | |
sid, trixie | 2:2.10-22 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
wpa | source | wheezy | (unfixed) | end-of-life | ||
wpa | source | (unstable) | 2:2.9+git20200213+877d9a0-1 | unimportant |
https://talosintelligence.com/vulnerability_reports/TALOS-2019-0849
https://w1.fi/cgit/hostap/commit/?id=018edec9b2bd3db20605117c32ff79c1e625c432
removes IAPP functionality from hostapd. IAPP implementation furthermore
was never really completed on wpa side and this obsoleted functionality in
hostapd had been moved to the kernel driver already.