Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-32292

Опубликовано: 03 авг. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

1.41-3
esm-apps/bionic

released

1.35-6ubuntu0.1~esm1
esm-apps/focal

released

1.36-2ubuntu0.1
esm-apps/jammy

released

1.36-2.3ubuntu0.1
esm-apps/xenial

released

1.21-1.2+deb8u1ubuntu0.1~esm1
focal

released

1.36-2ubuntu0.1
jammy

released

1.36-2.3ubuntu0.1
kinetic

not-affected

1.41-2
lunar

not-affected

1.41-2

Показывать по

EPSS

Процентиль: 83%
0.01941
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 3 лет назад

In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.

CVSS3: 9.8
debian
больше 3 лет назад

In ConnMan through 1.41, remote attackers able to send HTTP requests t ...

CVSS3: 9.8
github
больше 3 лет назад

In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.

CVSS3: 9.8
fstec
больше 3 лет назад

Уязвимость компонента gweb диспетчера соединений Connman, связанная с записью за границами выделенного диапазона памяти, позволяющая нарушителю выполнить произвольный код

suse-cvrf
больше 3 лет назад

Security update for connman

EPSS

Процентиль: 83%
0.01941
Низкий

9.8 Critical

CVSS3