7.8
CVSSv3

CVE-2016-4477

Published: 09/05/2016 Updated: 23/10/2017
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

wpa_supplicant 0.4.0 up to and including 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 5.1.1

google android 5.0.2

google android 6.0.1

google android 6.0

google android 4.4.4

Vendor Advisories

Debian Bug report logs - #823411 wpa: CVE-2016-4476 CVE-2016-4477 / 2016-1 advisory Package: src:wpa; Maintainer for src:wpa is Debian wpasupplicant Maintainers <wpa@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 4 May 2016 12:51:01 UTC Severity: important Tags: patch, securit ...
Several security issues were fixed in wpa_supplicant ...
wpa_supplicant 040 through 25 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command ...
The local configuration update through the control interface SET_NETWORK command could allow privilege escalation for the local user to run code from a locally stored library file under the same privileges as the wpa_supplicant process has The assumption here is that a not fully trusted user/application might have access through a connection manag ...