CVE-2021-26675
Ubuntu Security Notice USN-6236-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
Un desbordamiento de búfer en la región stack de la memoria en dnsproxy en ConnMan versiones anteriores a 1.39, podría ser usado por atacantes adyacentes a la red para ejecutar código
An update that fixes two vulnerabilities is now available. This update for connman fixes the following issues. Fixed issue with scanning state synchronization and iwd. Fixed issue with invalid key with 4-way handshake offloading. Fixed issue with DNS proxy length checks to prevent buffer overflow. Fixed issue with DHCP leaking stack data via uninitialized variable. Fixed issue with online check on IP address update. Fixed issue with OpenVPN and encrypted private keys. Fixed issue with finishing of VPN connections. Add support for updated stable iwd APIs. Add support for WireGuard networks. Fixed issue with handling invalid gateway addresses. Fixed issue with handling updates of default gateway. Fixed issue with DHCP servers that require broadcast flag. Add support for option to use gateways as time servers. Add support for option to select default technology. Add support for Address Conflict Detection. Add support for IPv6 iptables management. Change in 1.36. Fixed issue with DNS short response on error handling. Fixed issue with handling incoming DNS requests. Fixed issue with handling empty timeserver list. Fixed issue with incorrect DHCP byte order. Fixed issue with AllowDomainnameUpdates handling. Fixed issue with IPv4 link-local IP conflict error. Fixed issue with handling WISPr over TLS connections. Fixed issue with WiFi background scanning handling. Fixed issue with WiFi disconnect+connect race condition. Fixed issue with WiFi scanning and tethering operation. Fixed issue with WiFi security change handling. Fixed issue with missing signal for WPS changes. Fixed issue with online check retry handling. Add support for systemd-resolved backend. Add support for mDNS configuration setup. This update was imported from the openSUSE:Leap:15.2:Update update project.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-02-03 CVE Reserved
- 2021-02-09 CVE Published
- 2024-08-03 CVE Updated
- 2025-07-22 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=1181751 | Issue Tracking | |
https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog | Release Notes | |
https://kunnamon.io/tbone | Technical Description | |
https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html | Mailing List |
|
https://www.openwall.com/lists/oss-security/2021/02/08/2 | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb | 2022-05-23 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202107-29 | 2022-05-23 | |
https://www.debian.org/security/2021/dsa-4847 | 2022-05-23 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Intel Search vendor "Intel" | Connman Search vendor "Intel" for product "Connman" | < 1.39 Search vendor "Intel" for product "Connman" and version " < 1.39" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.2 Search vendor "Opensuse" for product "Leap" and version "15.2" | - |
Affected
|