Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-23096

Опубликовано: 28 янв. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.4
CVSS3: 9.1

Описание

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

1.41-3
esm-apps/bionic

released

1.35-6ubuntu0.1~esm1
esm-apps/focal

released

1.36-2ubuntu0.1
esm-apps/jammy

released

1.36-2.3ubuntu0.1
esm-apps/xenial

released

1.21-1.2+deb8u1ubuntu0.1~esm1
focal

released

1.36-2ubuntu0.1
impish

ignored

end of life
jammy

released

1.36-2.3ubuntu0.1
kinetic

not-affected

1.41-2

Показывать по

EPSS

Процентиль: 24%
0.00082
Низкий

6.4 Medium

CVSS2

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
nvd
около 4 лет назад

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

CVSS3: 9.1
debian
около 4 лет назад

An issue was discovered in the DNS proxy in Connman through 1.40. The ...

CVSS3: 9.1
github
почти 4 года назад

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

CVSS3: 9.1
fstec
около 4 лет назад

Уязвимость пакета dnsproxy диспетчера соединений Connman, позволяющая нарушителю вызвать отказ в обслуживании или раскрыть защищаемую информацию

EPSS

Процентиль: 24%
0.00082
Низкий

6.4 Medium

CVSS2

9.1 Critical

CVSS3