Vulnerability Name: | CVE-2021-26675 (CCN-196375) | ||||||||||||||||||||||||||||||||
Assigned: | 2021-02-08 | ||||||||||||||||||||||||||||||||
Published: | 2021-02-08 | ||||||||||||||||||||||||||||||||
Updated: | 2022-05-23 | ||||||||||||||||||||||||||||||||
Summary: | A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-26675 Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.suse.com/show_bug.cgi?id=1181751 Source: XF Type: UNKNOWN connman-cve202126675-bo(196375) Source: CCN Type: connman GIT Repository dnsproxy: Add length checks to prevent buffer overflow Source: CONFIRM Type: Patch, Third Party Advisory https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb Source: CONFIRM Type: Release Notes, Third Party Advisory https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog Source: MISC Type: Technical Description, Third Party Advisory https://kunnamon.io/tbone/ Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update Source: CCN Type: oss-sec Mailing List, Mon, 8 Feb 2021 10:11:05 +0100 Remote code execution in connman Source: GENTOO Type: Third Party Advisory GLSA-202107-29 Source: DEBIAN Type: Third Party Advisory DSA-4847 Source: MISC Type: Mailing List, Third Party Advisory https://www.openwall.com/lists/oss-security/2021/02/08/2 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |