Page 2 of 13 results (0.005 seconds)

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 1

An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read. Se ha detectado un problema en el proxy DNS en Connman versiones hasta 1.40. La función forward_dns_reply maneja inapropiadamente una llamada a strnlen, conllevando a una lectura fuera de límites • https://git.kernel.org/pub/scm/network/connman/connman.git/log https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html https://security.gentoo.org/glsa/202310-21 https://www.debian.org/security/2022/dsa-5231 https://www.openwall.com/lists/oss-security/2022/01/25/1 • CWE-125: Out-of-bounds Read •

CVSS: 6.5EPSS: 0%CPEs: 4EXPL: 0

gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp. Los atacantes adyacentes a la red podían usar gdhcp en ConnMan versiones anteriores a 1.39, para filtrar información confidencial de la pila, lo que permitiría una mayor explotación de los errores en gdhcp • https://bugzilla.suse.com/show_bug.cgi?id=1181751 https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1 https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog https://kunnamon.io/tbone https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html https://security.gentoo.org/glsa/202107-29 https://www.debia •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. Un desbordamiento de búfer en la región stack de la memoria en dnsproxy en ConnMan versiones anteriores a 1.39, podría ser usado por atacantes adyacentes a la red para ejecutar código • https://bugzilla.suse.com/show_bug.cgi?id=1181751 https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog https://kunnamon.io/tbone https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html https://security.gentoo.org/glsa/202107-29 https://www.debian.org/security/2021/dsa-4847 https://www.openwall.com/lists/oss-security/2021/02/08/2 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 5%CPEs: 2EXPL: 0

Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable. Un desbordamiento de búfer basado en pila en "dnsproxy.c" en connman 1.34 y anteriores permite que atacantes remotos provoquen una denegación de servicio (bloqueo) o ejecuten código arbitrario mediante una cadena de consulta de respuesta manipulada pasada a la variable "name". • http://www.debian.org/security/2017/dsa-3956 http://www.securityfocus.com/bid/100498 https://01.org/security/intel-oss-10001/intel-oss-10001 https://bugzilla.redhat.com/show_bug.cgi?id=1483720 https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71 https://security.gentoo.org/glsa/201812-02 https://www.nri-secure.com/blog/new-iot-vulnerability-connmando • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 0

ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets. ConnMan v1.3 en Tizen sigue enumerando el servicio de bluetooth después que el modo fuera de línea se ha activado, lo que podría permitir a atacantes remotos obtener información sensible a través de paquetes Bluetooth. • https://bugs.tizen.org/jira/browse/TIVI-211 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •