wpa_supplicant 0.4.0 up to and including 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google android 5.1.1 |
||
google android 5.0.2 |
||
google android 6.0.1 |
||
google android 6.0 |
||
google android 4.4.4 |