First published: Mon May 09 2016(Updated: )
wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =4.4.4 | |
Google Android | =5.0.2 | |
Google Android | =5.1.1 | |
Google Android | =6.0 | |
Google Android | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4477 has a high severity as it can allow local users to gain elevated privileges or cause a denial of service.
To fix CVE-2016-4477, update wpa_supplicant to the latest version that addresses this vulnerability.
CVE-2016-4477 affects Google Android versions 4.4.4 to 6.0.1.
CVE-2016-4477 can lead to arbitrary library loading, privilege escalation, or denial of service attacks.
CVE-2016-4477 is not remotely exploitable as it requires local access to the affected system.