Описание
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
Ссылки
- ProductThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- ProductThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.40 (включая)
cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
EPSS
Процентиль: 24%
0.0008
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-835
Связанные уязвимости
CVSS3: 7.5
ubuntu
около 4 лет назад
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
CVSS3: 7.5
debian
около 4 лет назад
An issue was discovered in the DNS proxy in Connman through 1.40. The ...
CVSS3: 7.5
github
почти 4 года назад
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
CVSS3: 7.5
fstec
около 4 лет назад
Уязвимость пакета dnsproxy диспетчера соединений Connman, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
Процентиль: 24%
0.0008
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-835