// For flags

CVE-2021-26675

Ubuntu Security Notice USN-6236-1

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.

Un desbordamiento de búfer en la región stack de la memoria en dnsproxy en ConnMan versiones anteriores a 1.39, podría ser usado por atacantes adyacentes a la red para ejecutar código

An update that fixes two vulnerabilities is now available. This update for connman fixes the following issues. Fixed issue with scanning state synchronization and iwd. Fixed issue with invalid key with 4-way handshake offloading. Fixed issue with DNS proxy length checks to prevent buffer overflow. Fixed issue with DHCP leaking stack data via uninitialized variable. Fixed issue with online check on IP address update. Fixed issue with OpenVPN and encrypted private keys. Fixed issue with finishing of VPN connections. Add support for updated stable iwd APIs. Add support for WireGuard networks. Fixed issue with handling invalid gateway addresses. Fixed issue with handling updates of default gateway. Fixed issue with DHCP servers that require broadcast flag. Add support for option to use gateways as time servers. Add support for option to select default technology. Add support for Address Conflict Detection. Add support for IPv6 iptables management. Change in 1.36. Fixed issue with DNS short response on error handling. Fixed issue with handling incoming DNS requests. Fixed issue with handling empty timeserver list. Fixed issue with incorrect DHCP byte order. Fixed issue with AllowDomainnameUpdates handling. Fixed issue with IPv4 link-local IP conflict error. Fixed issue with handling WISPr over TLS connections. Fixed issue with WiFi background scanning handling. Fixed issue with WiFi disconnect+connect race condition. Fixed issue with WiFi scanning and tethering operation. Fixed issue with WiFi security change handling. Fixed issue with missing signal for WPS changes. Fixed issue with online check retry handling. Add support for systemd-resolved backend. Add support for mDNS configuration setup. This update was imported from the openSUSE:Leap:15.2:Update update project.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-02-03 CVE Reserved
  • 2021-02-09 CVE Published
  • 2024-08-03 CVE Updated
  • 2025-07-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Intel
Search vendor "Intel"
Connman
Search vendor "Intel" for product "Connman"
< 1.39
Search vendor "Intel" for product "Connman" and version " < 1.39"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.2
Search vendor "Opensuse" for product "Leap" and version "15.2"
-
Affected