CVE-2016-4476
09.05.2016, 10:59
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.Enginsight
| Vendor | Product | Version |
|---|---|---|
| w1.fi | hostapd | 0.6.7 ≤ 𝑥 ≤ 2.5 |
| w1.fi | wpa_supplicant | 0.6.7 ≤ 𝑥 ≤ 2.5 |
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 16.04 |
| canonical | ubuntu_linux | 17.04 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| hostapd |
| ||||||||||||||||||||||||||||||
| wpa |
| ||||||||||||||||||||||||||||||
| wpasupplicant |
|
Common Weakness Enumeration