CVE-2016-4476 in hostapd
Summary
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
Reservation
05/03/2016
Disclosure
05/09/2016
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 87124 | hostapd/wpa_supplicant WPS Operation input validation | 20 | Not defined | Official fix | CVE-2016-4476 |