hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
The product does not properly verify that the source of data or communication is valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Hostapd | W1.fi | * | 2.9 (including) |
Wpa_supplicant | W1.fi | * | 2.9 (including) |
Wpa | Ubuntu | bionic | * |
Wpa | Ubuntu | devel | * |
Wpa | Ubuntu | disco | * |
Wpa | Ubuntu | trusty | * |
Wpa | Ubuntu | trusty/esm | * |
Wpa | Ubuntu | xenial | * |
Wpasupplicant | Ubuntu | trusty | * |