3.3
CVSSv2

CVE-2021-26676

Published: 09/02/2021 Updated: 06/05/2022
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 294
Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

gdhcp in ConnMan prior to 1.39 could be used by network-adjacent malicious users to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel connman

debian debian linux 9.0

debian debian linux 10.0

opensuse leap 15.2

Vendor Advisories

A remote information leak vulnerability and a remote buffer overflow vulnerability were discovered in ConnMan, a network manager for embedded devices, which could result in denial of service or the execution of arbitrary code For the stable distribution (buster), these problems have been fixed in version 136-21~deb10u1 We recommend that you upg ...
A security issue was found in connman 138 A stack information leak from an uninitialised variable can lead to information disclosure to a remote attacker This information can be used to help exploiting CVE-2021-26675 reliably ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Remote code execution in connman <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Marcus Meissner &lt;meissner () ...