hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/05/03/12 | Mailing List Third Party Advisory |
http://www.ubuntu.com/usn/USN-3455-1 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/05/03/12 | Mailing List Third Party Advisory |
http://www.ubuntu.com/usn/USN-3455-1 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2016/05/03/12 - Mailing List, Third Party Advisory | |
References | () http://www.ubuntu.com/usn/USN-3455-1 - Third Party Advisory |
Information
Published : 2016-05-09 10:59
Updated : 2024-11-21 02:52
NVD link : CVE-2016-4476
Mitre link : CVE-2016-4476
CVE.ORG link : CVE-2016-4476
JSON object : View
Products Affected
w1.fi
- hostapd
- wpa_supplicant
canonical
- ubuntu_linux
CWE
CWE-20
Improper Input Validation