CVE-2016-4477

Published: 09 May 2016

wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.

Priority

Low

CVSS 3 base score: 7.8

Status

Package Release Status
hostapd
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist
(precise was needed)
wpa
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla)
Released (2.4-0ubuntu10)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2.4-0ubuntu10)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.4-0ubuntu10)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2.4-0ubuntu6.2)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.1-0ubuntu1.5)
Ubuntu 12.04 ESM (Precise Pangolin) Does not exist

Patches:
Upstream: http://w1.fi/security/2016-1/0001-WPS-Reject-a-Credential-with-invalid-passphrase.patch
Upstream: http://w1.fi/security/2016-1/0002-Reject-psk-parameter-set-with-invalid-passphrase-cha.patch
Upstream: http://w1.fi/security/2016-1/0003-Remove-newlines-from-wpa_supplicant-config-network-o.patch
Upstream: http://w1.fi/security/2016-1/0004-Reject-SET_CRED-commands-with-newline-characters-in-.patch
Upstream: http://w1.fi/security/2016-1/0005-Reject-SET-commands-with-newline-characters-in-the-s.patch
wpasupplicant
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 20.10 (Groovy Gorilla) Does not exist

Ubuntu 20.04 LTS (Focal Fossa) Does not exist

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Needed