Bug 978172 (CVE-2016-4476) - VUL-1: CVE-2016-4476: wpa_supplicant, hostapd: denial of service via crafted WPA/WPA2 passphrase parameter
Summary: VUL-1: CVE-2016-4476: wpa_supplicant, hostapd: denial of service via crafted ...
Status: RESOLVED FIXED
Alias: CVE-2016-4476
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Clemens Famulla-Conrad
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/168544/
Whiteboard: CVSSv2:SUSE:CVE-2016-4476:1.9:(AV:L/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2016-05-03 08:20 UTC by Sebastian Krahmer
Modified: 2020-06-29 06:24 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2016-05-03 08:20:54 UTC
Via OSS-sec:

We understand the existence of the CVE-2016-2447 ID in
http://source.android.com/security/bulletin/2016-05-01.html and that
the reports credit Imre Rad; however, there are different exploitation
scenarios that affect different versions from the perspective of
hostapd/wpa_supplicant, and thus it is probably simplest for most
people to have separate hostapd/wpa_supplicant CVE IDs.

> WPA/WPA2 passphrase parameter ... to include control characters

> The WPS trigger for this requires local user action to authorize the WPS
> operation in which a new configuration would be received. The attacker
> would also need to be in radio range of the device or have access to the
> IP network to act as a WPS External Registrar. Such an attack could
> result in denial of service by not allowing hostapd or wpa_supplicant to
> start after they have been stopped.
>
> wpa_supplicant v0.6.7-v2.5 with CONFIG_WPS build option enabled
> hostapd v0.6.7-v2.5 with CONFIG_WPS build option enabled

Use CVE-2016-4476.


rh#1332422

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1332422
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4476
http://seclists.org/oss-sec/2016/q2/189
http://w1.fi/security/2016-1/
Comment 3 Marcus Meissner 2020-03-18 08:34:37 UTC
-> new maintainer Clemens
Comment 4 Clemens Famulla-Conrad 2020-04-23 20:46:49 UTC
We use wpa_supplicant >=2.6