Intel

Connman

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 12.04.2023 16:15:19
  • Zuletzt bearbeitet 08.02.2025 03:15:10

client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.

  • EPSS 1.71%
  • Veröffentlicht 03.08.2022 14:15:08
  • Zuletzt bearbeitet 21.11.2024 07:06:07

In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.

  • EPSS 0.35%
  • Veröffentlicht 03.08.2022 14:15:08
  • Zuletzt bearbeitet 21.11.2024 07:06:07

In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 28.01.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 06:47:58

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 28.01.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 06:47:59

An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 28.01.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 06:47:59

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.

  • EPSS 0.14%
  • Veröffentlicht 09.02.2021 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:39

A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.

  • EPSS 0.1%
  • Veröffentlicht 09.02.2021 16:15:12
  • Zuletzt bearbeitet 21.11.2024 05:56:39

gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.

  • EPSS 3.76%
  • Veröffentlicht 29.08.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.

  • EPSS 0.25%
  • Veröffentlicht 01.01.2013 15:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets.