CVE-2016-4477
09.05.2016, 10:59
wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.Enginsight
Vendor | Product | Version |
---|---|---|
android | 4.4.4 | |
android | 5.0.2 | |
android | 5.1.1 | |
android | 6.0 | |
android | 6.0.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
hostapd |
| ||||||||||||||||||||||||||||||
wpa |
| ||||||||||||||||||||||||||||||
wpasupplicant |
|
Common Weakness Enumeration
References