Опубликовано: 09 фев. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8
CVSS3: 8.8
Описание
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| devel | not-affected | 1.41-2 |
| esm-apps/bionic | released | 1.35-6ubuntu0.1~esm1 |
| esm-apps/focal | released | 1.36-2ubuntu0.1 |
| esm-apps/jammy | not-affected | 1.36-2.3build1 |
| esm-apps/xenial | not-affected | code not present |
| esm-infra-legacy/trusty | DNE | |
| focal | released | 1.36-2ubuntu0.1 |
| groovy | ignored | end of life |
| hirsute | ignored | end of life |
Показывать по
10
Ссылки на источники
EPSS
Процентиль: 40%
0.00186
Низкий
5.8 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
nvd
почти 5 лет назад
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
CVSS3: 8.8
debian
почти 5 лет назад
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could ...
CVSS3: 8.8
github
больше 3 лет назад
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
CVSS3: 8.8
fstec
почти 5 лет назад
Уязвимость пакета dnsproxy диспетчера соединений Connman, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 40%
0.00186
Низкий
5.8 Medium
CVSS2
8.8 High
CVSS3