Описание
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
Ссылки
- Issue TrackingThird Party Advisory
- PatchThird Party Advisory
- Release NotesThird Party Advisory
- Technical DescriptionThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Issue TrackingThird Party Advisory
- PatchThird Party Advisory
- Release NotesThird Party Advisory
- Technical DescriptionThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.39 (исключая)
cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Конфигурация 3
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*
EPSS
Процентиль: 40%
0.00186
Низкий
8.8 High
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 8.8
ubuntu
почти 5 лет назад
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
CVSS3: 8.8
debian
почти 5 лет назад
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could ...
CVSS3: 8.8
github
больше 3 лет назад
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
CVSS3: 8.8
fstec
почти 5 лет назад
Уязвимость пакета dnsproxy диспетчера соединений Connman, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 40%
0.00186
Низкий
8.8 High
CVSS3
5.8 Medium
CVSS2
Дефекты
CWE-787