CVE-2019-5062

NameCVE-2019-5062
DescriptionAn exploitable denial-of-service vulnerability exists in the 802.11w security state handling for hostapd 2.6 connected clients with valid 802.11w sessions. By simulating an incomplete new association, an attacker can trigger a deauthentication against stations using 802.11w, resulting in a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitylow

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wpa (PTS)stretch2:2.4-1+deb9u6vulnerable
stretch (security)2:2.4-1+deb9u7vulnerable
buster2:2.7+git20190128+0c1e29f-6+deb10u2vulnerable
buster (security)2:2.7+git20190128+0c1e29f-6+deb10u1vulnerable
bullseye, sid2:2.9.0-15vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wpasource(unstable)(unfixed)unimportant

Notes

https://talosintelligence.com/vulnerability_reports/TALOS-2019-0850
Issue is not considered the report recieved bogus and at most with very
negligible impact. Issue likely would need to be disputed or rejected.

Search for package or bug name: Reporting problems