Vulnerability Details CVE-2016-4477
wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 46.1%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 4.4
Products affected by CVE-2016-4477
-
cpe:2.3:o:google:android:4.4.4
-
cpe:2.3:o:google:android:5.0.2
-
cpe:2.3:o:google:android:5.1.1
-
cpe:2.3:o:google:android:6.0
-
cpe:2.3:o:google:android:6.0.1