[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-23096Date: (C)2022-02-04   (M)2024-02-12


An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.1CVSS Score : 6.4
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.2Impact Score: 4.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
DSA-5231
GLSA-202310-21
https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html
https://git.kernel.org/pub/scm/network/connman/connman.git/log/
https://www.openwall.com/lists/oss-security/2022/01/25/1

CWE    1
CWE-125
OVAL    5
oval:org.secpod.oval:def:610159
oval:org.secpod.oval:def:88401
oval:org.secpod.oval:def:93275
oval:org.secpod.oval:def:91657
...

© SecPod Technologies