Описание
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | wpa_supplicant | Not affected | ||
| Red Hat Enterprise Linux 6 | wpa_supplicant | Will not fix | ||
| Red Hat Enterprise Linux 7 | wpa_supplicant | Will not fix |
Показывать по
Дополнительная информация
Статус:
5.9 Medium
CVSS3
1.9 Low
CVSS2
Связанные уязвимости
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not ...
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
5.9 Medium
CVSS3
1.9 Low
CVSS2