CVE-2016-4476

Priority
Description
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not
reject \n and \r characters in passphrase parameters, which allows remote
attackers to cause a denial of service (daemon outage) via a crafted WPS
operation.
References
Bugs
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 18.10 (Cosmic Cuttlefish):DNE
Package
Source: wpa (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (2.1-0ubuntu1.5)
Ubuntu 16.04 LTS (Xenial Xerus):released (2.4-0ubuntu6.2)
Ubuntu 18.04 LTS (Bionic Beaver):released (2.4-0ubuntu10)
Ubuntu 18.10 (Cosmic Cuttlefish):released (2.4-0ubuntu10)
Patches:
Upstream:http://w1.fi/security/2016-1/0001-WPS-Reject-a-Credential-with-invalid-passphrase.patch
Upstream:http://w1.fi/security/2016-1/0002-Reject-psk-parameter-set-with-invalid-passphrase-cha.patch
Upstream:http://w1.fi/security/2016-1/0003-Remove-newlines-from-wpa_supplicant-config-network-o.patch
Upstream:http://w1.fi/security/2016-1/0004-Reject-SET_CRED-commands-with-newline-characters-in-.patch
Upstream:http://w1.fi/security/2016-1/0005-Reject-SET-commands-with-newline-characters-in-the-s.patch
More Information

Updated: 2018-09-26 06:19:45 UTC (commit 02d3bad41193eca446568274a00f5327533b310b)