{"id":"CVE-2019-16275","details":"hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.","modified":"2026-04-16T04:33:55.689099255Z","published":"2019-09-12T20:15:11.773Z","related":["SUSE-SU-2020:3380-1","SUSE-SU-2020:3424-1","SUSE-SU-2021:0478-1","openSUSE-SU-2020:2053-1","openSUSE-SU-2020:2059-1","openSUSE-SU-2021:0519-1","openSUSE-SU-2021:0545-1","openSUSE-SU-2024:10846-1","openSUSE-SU-2024:11515-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Sep/56"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4136-2/"},{"type":"ADVISORY","url":"https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4538"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/09/12/6"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4136-1/"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2019/09/11/7"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html"},{"type":"FIX","url":"https://w1.fi/security/2019-7/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.9"}]},{"events":[{"introduced":"0"},{"last_affected":"2.9"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"19.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-16275.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}