CVE-2023-28488
- EPSS 0.04%
- Veröffentlicht 12.04.2023 16:15:19
- Zuletzt bearbeitet 08.02.2025 03:15:10
client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.
CVE-2022-32292
- EPSS 1.71%
- Veröffentlicht 03.08.2022 14:15:08
- Zuletzt bearbeitet 21.11.2024 07:06:07
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
CVE-2022-32293
- EPSS 0.35%
- Veröffentlicht 03.08.2022 14:15:08
- Zuletzt bearbeitet 21.11.2024 07:06:07
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
CVE-2022-23096
- EPSS 0.08%
- Veröffentlicht 28.01.2022 16:15:07
- Zuletzt bearbeitet 21.11.2024 06:47:58
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
CVE-2022-23097
- EPSS 0.09%
- Veröffentlicht 28.01.2022 16:15:07
- Zuletzt bearbeitet 21.11.2024 06:47:59
An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.
CVE-2022-23098
- EPSS 0.08%
- Veröffentlicht 28.01.2022 16:15:07
- Zuletzt bearbeitet 21.11.2024 06:47:59
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
CVE-2021-26675
- EPSS 0.14%
- Veröffentlicht 09.02.2021 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:56:39
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
CVE-2021-26676
- EPSS 0.1%
- Veröffentlicht 09.02.2021 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:56:39
gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
CVE-2017-12865
- EPSS 3.76%
- Veröffentlicht 29.08.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
CVE-2012-6459
- EPSS 0.25%
- Veröffentlicht 01.01.2013 15:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote attackers to obtain sensitive information via Bluetooth packets.