Vulnerability Name:

CVE-2021-26675 (CCN-196375)

Assigned:2021-02-08
Published:2021-02-08
Updated:2022-05-23
Summary:A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.8 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
8.3 High (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-26675

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1181751

Source: XF
Type: UNKNOWN
connman-cve202126675-bo(196375)

Source: CCN
Type: connman GIT Repository
dnsproxy: Add length checks to prevent buffer overflow

Source: CONFIRM
Type: Patch, Third Party Advisory
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb

Source: CONFIRM
Type: Release Notes, Third Party Advisory
https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog

Source: MISC
Type: Technical Description, Third Party Advisory
https://kunnamon.io/tbone/

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update

Source: CCN
Type: oss-sec Mailing List, Mon, 8 Feb 2021 10:11:05 +0100
Remote code execution in connman

Source: GENTOO
Type: Third Party Advisory
GLSA-202107-29

Source: DEBIAN
Type: Third Party Advisory
DSA-4847

Source: MISC
Type: Mailing List, Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/02/08/2

Vulnerable Configuration:Configuration 1:
  • cpe:/a:intel:connman:*:*:*:*:*:*:*:* (Version < 1.39)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:opensuse:leap:15.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:intel:connman:1.38:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:112092
    P
    connman-1.40-2.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105634
    P
    connman-1.40-2.2 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:11188
    P
    Security update for connman (Moderate)
    2021-03-20
    oval:org.opensuse.security:def:96457
    P
    Security update for connman (Moderate)
    2021-03-20
    oval:org.opensuse.security:def:103147
    P
    Security update for connman (Moderate)
    2021-03-20
    oval:org.opensuse.security:def:109804
    P
    Security update for connman (Moderate)
    2021-03-20
    oval:org.opensuse.security:def:111268
    P
    Security update for connman (Moderate)
    2021-03-16
    BACK
    intel connman *
    debian debian linux 9.0
    debian debian linux 10.0
    opensuse leap 15.2
    intel connman 1.38