{"id":"CVE-2016-4477","details":"wpa_supplicant 0.4.0 through 2.5 does not reject \\n and \\r characters in passphrase parameters, which allows local users to trigger arbitrary library loading and consequently gain privileges, or cause a denial of service (daemon outage), via a crafted (1) SET, (2) SET_CRED, or (3) SET_NETWORK command.","modified":"2026-04-16T06:19:05.954208650Z","published":"2016-05-09T10:59:42.987Z","related":["openSUSE-SU-2024:10499-1"],"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2016/05/03/12"},{"type":"ADVISORY","url":"http://source.android.com/security/bulletin/2016-05-01.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3455-1"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.4.4"}]},{"events":[{"introduced":"0"},{"last_affected":"5.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"5.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4477.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}