Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4476

Опубликовано: 02 мая 2016
Источник: redhat
CVSS3: 5.9
CVSS2: 1.9

Описание

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wpa_supplicantNot affected
Red Hat Enterprise Linux 6wpa_supplicantWill not fix
Red Hat Enterprise Linux 7wpa_supplicantWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-88
https://bugzilla.redhat.com/show_bug.cgi?id=1332422hostapd: denial of service via crafted WPA/WPA2 passphrase parameter

5.9 Medium

CVSS3

1.9 Low

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 9 лет назад

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

CVSS3: 7.5
nvd
больше 9 лет назад

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

CVSS3: 7.5
debian
больше 9 лет назад

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not ...

CVSS3: 7.5
github
больше 3 лет назад

hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.

suse-cvrf
больше 8 лет назад

Security update for hostapd

5.9 Medium

CVSS3

1.9 Low

CVSS2