CVE Vulnerabilities

CVE-2016-4477

Published: May 09, 2016 | Modified: Apr 12, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
4.4 MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
4.4 MODERATE
AV:L/AC:M/Au:N/C:P/I:P/A:P
RedHat/V3
7 MODERATE
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

wpa_supplicant 0.4.0 through 2.5 does not reject n and r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.

Affected Software

NameVendorStart VersionEnd Version
AndroidGoogle4.4.4 (including)4.4.4 (including)
AndroidGoogle5.0.2 (including)5.0.2 (including)
AndroidGoogle5.1.1 (including)5.1.1 (including)
AndroidGoogle6.0 (including)6.0 (including)
AndroidGoogle6.0.1 (including)6.0.1 (including)
HostapdUbuntuprecise*
WpaUbuntuartful*
WpaUbuntubionic*
WpaUbuntucosmic*
WpaUbuntudevel*
WpaUbuntudisco*
WpaUbuntueoan*
WpaUbuntuesm-infra-legacy/trusty*
WpaUbuntuesm-infra/bionic*
WpaUbuntuesm-infra/focal*
WpaUbuntuesm-infra/xenial*
WpaUbuntufocal*
WpaUbuntugroovy*
WpaUbuntuhirsute*
WpaUbuntutrusty*
WpaUbuntutrusty/esm*
WpaUbuntuvivid/stable-phone-overlay*
WpaUbuntuvivid/ubuntu-core*
WpaUbuntuwily*
WpaUbuntuxenial*
WpaUbuntuyakkety*
WpaUbuntuzesty*
WpasupplicantUbuntuprecise*
WpasupplicantUbuntuprecise/esm*

References