hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7...
High severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
May 9, 2016
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Feb 1, 2023
hostapd 0.6.7 through 2.5 and wpa_supplicant 0.6.7 through 2.5 do not reject \n and \r characters in passphrase parameters, which allows remote attackers to cause a denial of service (daemon outage) via a crafted WPS operation.
References