5.8
CVSSv2

CVE-2021-26675

Published: 09/02/2021 Updated: 23/05/2022
CVSS v2 Base Score: 5.8 | Impact Score: 6.4 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A stack-based buffer overflow in dnsproxy in ConnMan prior to 1.39 could be used by network adjacent malicious users to execute code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel connman

debian debian linux 9.0

debian debian linux 10.0

opensuse leap 15.2

Vendor Advisories

A remote information leak vulnerability and a remote buffer overflow vulnerability were discovered in ConnMan, a network manager for embedded devices, which could result in denial of service or the execution of arbitrary code For the stable distribution (buster), these problems have been fixed in version 136-21~deb10u1 We recommend that you upg ...
A security issue was found in connman 138 A stack buffer overflow can be used to execute code by network adjacent attackers ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Remote code execution in connman <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Marcus Meissner &lt;meissner () ...