Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2020.0244
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2020-0244)
Summary:The remote host is missing an update for the 'hostapd, wpa_supplicant' package(s) announced via the MGASA-2020-0244 advisory.
Description:Summary:
The remote host is missing an update for the 'hostapd, wpa_supplicant' package(s) announced via the MGASA-2020-0244 advisory.

Vulnerability Insight:
Updated wpa_supplicant and hostpad packages fix security vulnerability:

A vulnerability was discovered in wpa_supplicant. When Access Point (AP)
mode and Protected Management Frames (PMF) (IEEE 802.11w) are enabled,
wpa_supplicant does not perform enough validation on the source address
of some received management frames. An attacker within the 802.11
communications range could use this flaw to inject an unauthenticated
frame and perform a denial-of-service attack against another device which
would be disconnected from the network (CVE-2019-16275).

Affected Software/OS:
'hostapd, wpa_supplicant' package(s) on Mageia 7.

Solution:
Please install the updated package(s).

CVSS Score:
3.3

CVSS Vector:
AV:A/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-16275
Bugtraq: 20190929 [SECURITY] [DSA 4538-1] wpa security update (Google Search)
https://seclists.org/bugtraq/2019/Sep/56
Debian Security Information: DSA-4538 (Google Search)
https://www.debian.org/security/2019/dsa-4538
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36G4XAZ644DMHBLKOL4FDSPZVIGNQY6U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PBJXUKV6XMSELWNXPS37CSUIH5EUHFXQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HY6STGJIIROVNIU6VMB2WTN2Q5M65WF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B7NCLOPTZNRRNYODH22BFIDH6YIQWLJD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEGITWRTIWABW54ANEPCEF4ARZLXGSK5/
https://w1.fi/security/2019-7/
https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
https://www.openwall.com/lists/oss-security/2019/09/11/7
https://lists.debian.org/debian-lts-announce/2019/09/msg00017.html
http://www.openwall.com/lists/oss-security/2019/09/12/6
https://usn.ubuntu.com/4136-1/
https://usn.ubuntu.com/4136-2/
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.