An issue exists in the DNS proxy in Connman up to and including 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
intel connman |
||
debian debian linux 9.0 |
||
debian debian linux 11.0 |