CVE-2016-4476
09.05.2016, 10:59
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.Enginsight
Vendor | Product | Version |
---|---|---|
w1.fi | hostapd | 0.6.7 ≤ 𝑥 ≤ 2.5 |
w1.fi | wpa_supplicant | 0.6.7 ≤ 𝑥 ≤ 2.5 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
hostapd |
| ||||||||||||||||||||||||||||||
wpa |
| ||||||||||||||||||||||||||||||
wpasupplicant |
|
Common Weakness Enumeration