ALPINE-CVE-2019-9496 PUBLISHED CVSS 7.5 HIGH

An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.

Risk Scores

CVSS v3.0
7.5
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products

VendorProductVersions
Alpine:v3.8hostapd2.2-r0, 2.1-r0, 2.0-r1
Alpine:v3.19hostapd2.3-r0, 2.1-r0, 0.7.3-r2
Alpine:v3.21hostapd0.6.10-r1, 2.7-r0, 2.6-r5
Alpine:v3.11hostapd0.6.10-r0, 2.4-r0, 2.4-r1
Alpine:v3.18hostapd0.6.10-r0, 2.7-r0, 2.6-r5
Alpine:v3.15hostapd2.3-r0, 2.4-r0, 2.4-r1
Alpine:v3.23hostapd0.7.3-r1, 0, 0.6.10-r0
Alpine:v3.20hostapd0.6.9-r0, 2.7-r0, 2.6-r5
Alpine:v3.7hostapd0.7.3-r1, 0, 0.6.10-r0
Alpine:v3.14hostapd2.6-r5, 0, 0.6.10-r0
Alpine:v3.22hostapd0, 2.7-r0, 2.6-r5
Alpine:v3.12hostapd2.6-r4, 0, 0.6.10-r0
Alpine:v3.10hostapd0.6.9-r0, 0.6.10-r2, 0.6.10-r1
Alpine:v3.6hostapd1.1-r0, 2.0-r1, 2.1-r0
Alpine:v3.9hostapd1.0-r2, 0, 0.6.10-r0
Alpine:v3.16hostapd2.5-r3, 2.0-r0, 0
Alpine:v3.17hostapd0.6.10-r2, 2.6-r2, 2.6-r1
Alpine:v3.13hostapd2.5-r1, 2.0-r1, 2.5-r0

Timeline

References

Open in Interactive Console →