Vulnerability Name: | CVE-2021-26676 (CCN-196377) | ||||||||||||||||||||||||||||||||
Assigned: | 2021-02-08 | ||||||||||||||||||||||||||||||||
Published: | 2021-02-08 | ||||||||||||||||||||||||||||||||
Updated: | 2022-05-06 | ||||||||||||||||||||||||||||||||
Summary: | gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-26676 Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.suse.com/show_bug.cgi?id=1181751 Source: XF Type: UNKNOWN connman-cve202126676-info-disc(196377) Source: CCN Type: connman GIT Repository gdhcp: Avoid reading invalid data in dhcp_get_option Source: CONFIRM Type: Patch, Third Party Advisory https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa Source: CCN Type: connman GIT Repository gdhcp: Avoid leaking stack data via unitiialized variable Source: CONFIRM Type: Patch, Third Party Advisory https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1 Source: CONFIRM Type: Release Notes, Third Party Advisory https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog Source: MISC Type: Third Party Advisory https://kunnamon.io/tbone/ Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20210209 [SECURITY] [DLA 2552-1] connman security update Source: CCN Type: oss-sec Mailing List, Mon, 8 Feb 2021 10:11:05 +0100 Remote code execution in connman Source: GENTOO Type: Third Party Advisory GLSA-202107-29 Source: DEBIAN Type: Third Party Advisory DSA-4847 Source: MISC Type: Mailing List, Third Party Advisory https://www.openwall.com/lists/oss-security/2021/02/08/2 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |