Rapid7 Vulnerability & Exploit Database

Red Hat OpenShift: CVE-2019-5108: kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Red Hat OpenShift: CVE-2019-5108: kernel: triggering AP to send IAPP location updates for stations before the required authentication process has completed can lead to DoS

Severity
3
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:P)
Published
12/23/2019
Created
02/11/2021
Added
02/10/2021
Modified
05/10/2023

Description

An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability.

Solution(s)

  • linuxrpm-upgrade-redhat-coreos

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;