Executive Summary

Title wpa security update
Name DSA-4538 First vendor Publication 2019-09-29
Vendor Debian Last vendor Modification 2019-09-29
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Two vulnerabilities were found in the WPA protocol implementation found in wpa_supplication (station) and hostapd (access point).


A timing-based side-channel attack against WPA3's Dragonfly handshake when using Brainpool curves could be used by an attacker to retrieve the password.


Insufficient source address validation for some received Management frames in hostapd could lead to a denial of service for stations associated to an access point. An attacker in radio range of the access point could inject a specially constructed unauthenticated IEEE 802.11 frame to the access point to cause associated stations to be disconnected and require a reconnection to the network.

For the oldstable distribution (stretch), these problems have been fixed in version $stretch_VERSION.

For the stable distribution (buster), these problems have been fixed in version 2:2.7+git20190128+0c1e29f-6+deb10u1.

We recommend that you upgrade your wpa packages.

For the detailed security status of wpa please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wpa

Original Source

Url : http://www.debian.org/security/2019/dsa-4538

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-346 Origin Validation Error
50 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

Application 68
Application 76
Os 5
Os 2
Os 1

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-09-29 17:18:41
  • First insertion