wpa_supplicant 0.4.0 through 2.5 does not reject \n and \r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
http://source.android.com/security/bulletin/2016-05-01.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2016/05/03/12 | mailing list |
http://www.ubuntu.com/usn/USN-3455-1 | vendor advisory |