Vulnerability Name:

CVE-2021-26676 (CCN-196377)

Assigned:2021-02-08
Published:2021-02-08
Updated:2022-05-06
Summary:gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
6.1 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2021-26676

Source: MISC
Type: Issue Tracking, Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1181751

Source: XF
Type: UNKNOWN
connman-cve202126676-info-disc(196377)

Source: CCN
Type: connman GIT Repository
gdhcp: Avoid reading invalid data in dhcp_get_option

Source: CONFIRM
Type: Patch, Third Party Advisory
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa

Source: CCN
Type: connman GIT Repository
gdhcp: Avoid leaking stack data via unitiialized variable

Source: CONFIRM
Type: Patch, Third Party Advisory
https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1

Source: CONFIRM
Type: Release Notes, Third Party Advisory
https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog

Source: MISC
Type: Third Party Advisory
https://kunnamon.io/tbone/

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update

Source: CCN
Type: oss-sec Mailing List, Mon, 8 Feb 2021 10:11:05 +0100
Remote code execution in connman

Source: GENTOO
Type: Third Party Advisory
GLSA-202107-29

Source: DEBIAN
Type: Third Party Advisory
DSA-4847

Source: MISC
Type: Mailing List, Third Party Advisory
https://www.openwall.com/lists/oss-security/2021/02/08/2

Vulnerable Configuration:Configuration 1:
  • cpe:/a:intel:connman:*:*:*:*:*:*:*:* (Version < 1.39)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:opensuse:leap:15.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:intel:connman:1.38:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:112092
    P
    connman-1.40-2.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105634
    P
    connman-1.40-2.2 on GA media (Moderate)
    2021-10-01
    oval:org.opensuse.security:def:11188
    P
    Security update for connman (Moderate)
    2021-03-20
    oval:org.opensuse.security:def:96457
    P
    Security update for connman (Moderate)
    2021-03-20
    oval:org.opensuse.security:def:103147
    P
    Security update for connman (Moderate)
    2021-03-20
    oval:org.opensuse.security:def:109804
    P
    Security update for connman (Moderate)
    2021-03-20
    oval:org.opensuse.security:def:111268
    P
    Security update for connman (Moderate)
    2021-03-16
    BACK
    intel connman *
    debian debian linux 9.0
    debian debian linux 10.0
    opensuse leap 15.2
    intel connman 1.38