wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://source.android.com/security/bulletin/2016-05-01.html - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/03/12 - | |
References | () http://www.ubuntu.com/usn/USN-3455-1 - |
Information
Published : 2016-05-09 10:59
Updated : 2024-11-21 02:52
NVD link : CVE-2016-4477
Mitre link : CVE-2016-4477
CVE.ORG link : CVE-2016-4477
JSON object : View
Products Affected
- android
CWE
CWE-19
Data Processing Errors