Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4476

Опубликовано: 09 мая 2016
Источник: debian
EPSS Низкий

Описание

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpafixed2.3-2.4package
wpafixed2.3-1+deb8u4jessiepackage

Примечания

  • http://w1.fi/security/2016-1/

EPSS

Процентиль: 69%
0.0061
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

CVSS3: 5.9
redhat
почти 10 лет назад

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

CVSS3: 7.5
nvd
больше 9 лет назад

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

CVSS3: 7.5
github
больше 3 лет назад

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

suse-cvrf
больше 8 лет назад

Security update for hostapd

EPSS

Процентиль: 69%
0.0061
Низкий