Описание
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | not-affected | 1.35-1 |
| bionic | not-affected | 1.35-1 |
| cosmic | not-affected | 1.35-1 |
| devel | not-affected | 1.35-1 |
| disco | not-affected | 1.35-1 |
| esm-apps/bionic | not-affected | 1.35-1 |
| esm-apps/xenial | released | 1.21-1.2+deb8u1build0.16.04.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
Показывать по
Ссылки на источники
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlie ...
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
Уязвимость диспетчера соединений Connman («dnsproxy.c»), позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
7.5 High
CVSS2
9.8 Critical
CVSS3