Vulnerabilites related to ConnMan - ConnMan
CVE-2012-2321 (GCVE-0-2012-2321)
Vulnerability from cvelistv5
Published
2012-05-18 22:00
Modified
2024-08-06 19:26
Severity ?
CWE
  • n/a
Summary
The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:08.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "53408",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53408"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a"
          },
          {
            "name": "81705",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/81705"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911"
          },
          {
            "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
          },
          {
            "name": "GLSA-201205-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
          },
          {
            "name": "[oss-security] 20120507 connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
          },
          {
            "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
          },
          {
            "name": "connman-hostname-command-exec(75466)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466"
          },
          {
            "name": "49033",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49033"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
          },
          {
            "name": "49186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49186"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "53408",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53408"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a"
        },
        {
          "name": "81705",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/81705"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911"
        },
        {
          "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
        },
        {
          "name": "GLSA-201205-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
        },
        {
          "name": "[oss-security] 20120507 connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
        },
        {
          "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
        },
        {
          "name": "connman-hostname-command-exec(75466)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466"
        },
        {
          "name": "49033",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49033"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
        },
        {
          "name": "49186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49186"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2321",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "53408",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53408"
            },
            {
              "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=26ace5c59f790bce0f1988b88874c6f2c480fd5a",
              "refsource": "CONFIRM",
              "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=26ace5c59f790bce0f1988b88874c6f2c480fd5a"
            },
            {
              "name": "81705",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/81705"
            },
            {
              "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911",
              "refsource": "CONFIRM",
              "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911"
            },
            {
              "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
            },
            {
              "name": "GLSA-201205-02",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
            },
            {
              "name": "[oss-security] 20120507 connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
            },
            {
              "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
            },
            {
              "name": "connman-hostname-command-exec(75466)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466"
            },
            {
              "name": "49033",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49033"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=715172",
              "refsource": "MISC",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
            },
            {
              "name": "49186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49186"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2321",
    "datePublished": "2012-05-18T22:00:00",
    "dateReserved": "2012-04-19T00:00:00",
    "dateUpdated": "2024-08-06T19:26:08.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32743 (GCVE-0-2025-32743)
Vulnerability from cvelistv5
Published
2025-04-10 00:00
Modified
2025-04-10 14:30
Severity ?
CWE
  • CWE-392 - Missing Report of Error Condition
Summary
In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations.
Impacted products
Vendor Product Version
ConnMan ConnMan Version: 0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32743",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-10T14:30:10.050718Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-10T14:30:27.850Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "ConnMan",
          "vendor": "ConnMan",
          "versions": [
            {
              "lessThanOrEqual": "1.44",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "1.44",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-392",
              "description": "CWE-392 Missing Report of Error Condition",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-10T13:24:48.982Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://web.git.kernel.org/pub/scm/network/connman/connman.git/tree/src/dnsproxy.c?h=1.44#n1688"
        },
        {
          "url": "https://lapis-sawfish-be3.notion.site/0-click-Vulnerability-in-Comman-1-43_v3-1cadc00d01d080b0b3b9c46a6da584cc"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-32743",
    "datePublished": "2025-04-10T00:00:00.000Z",
    "dateReserved": "2025-04-10T00:00:00.000Z",
    "dateUpdated": "2025-04-10T14:30:27.850Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2320 (GCVE-0-2012-2320)
Vulnerability from cvelistv5
Published
2012-05-18 22:00
Modified
2024-08-06 19:26
Severity ?
CWE
  • n/a
Summary
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:09.155Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "connman-netlink-security-bypass(75465)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618"
          },
          {
            "name": "81704",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/81704"
          },
          {
            "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
          },
          {
            "name": "GLSA-201205-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9"
          },
          {
            "name": "[oss-security] 20120507 connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
          },
          {
            "name": "53406",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53406"
          },
          {
            "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
          },
          {
            "name": "49033",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49033"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
          },
          {
            "name": "49186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49186"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "connman-netlink-security-bypass(75465)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618"
        },
        {
          "name": "81704",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/81704"
        },
        {
          "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
        },
        {
          "name": "GLSA-201205-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9"
        },
        {
          "name": "[oss-security] 20120507 connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
        },
        {
          "name": "53406",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53406"
        },
        {
          "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
        },
        {
          "name": "49033",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49033"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
        },
        {
          "name": "49186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49186"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2320",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "connman-netlink-security-bypass(75465)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465"
            },
            {
              "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618",
              "refsource": "CONFIRM",
              "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618"
            },
            {
              "name": "81704",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/81704"
            },
            {
              "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
            },
            {
              "name": "GLSA-201205-02",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
            },
            {
              "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=c1b968984212b46bea1330f5ae029507b9bfded9",
              "refsource": "CONFIRM",
              "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=c1b968984212b46bea1330f5ae029507b9bfded9"
            },
            {
              "name": "[oss-security] 20120507 connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
            },
            {
              "name": "53406",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53406"
            },
            {
              "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
            },
            {
              "name": "49033",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49033"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=715172",
              "refsource": "MISC",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
            },
            {
              "name": "49186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49186"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2320",
    "datePublished": "2012-05-18T22:00:00",
    "dateReserved": "2012-04-19T00:00:00",
    "dateUpdated": "2024-08-06T19:26:09.155Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-32366 (GCVE-0-2025-32366)
Vulnerability from cvelistv5
Published
2025-04-05 00:00
Modified
2025-04-15 15:15
CWE
  • CWE-130 - Improper Handling of Length Parameter Inconsistency
Summary
In ConnMan through 1.44, parse_rr in dnsproxy.c has a memcpy length that depends on an RR RDLENGTH value, i.e., *rdlen=ntohs(rr->rdlen) and memcpy(response+offset,*end,*rdlen) without a check for whether the sum of *end and *rdlen exceeds max. Consequently, *rdlen may be larger than the amount of remaining packet data in the current state of parsing. Values of stack memory locations may be sent over the network in a response.
Impacted products
Vendor Product Version
ConnMan ConnMan Version: 0   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-32366",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T14:42:05.651515Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-15T15:15:06.273Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ConnMan",
          "vendor": "ConnMan",
          "versions": [
            {
              "lessThanOrEqual": "1.44",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*",
                  "versionEndIncluding": "1.44",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In ConnMan through 1.44, parse_rr in dnsproxy.c has a memcpy length that depends on an RR RDLENGTH value, i.e., *rdlen=ntohs(rr-\u003erdlen) and memcpy(response+offset,*end,*rdlen) without a check for whether the sum of *end and *rdlen exceeds max. Consequently, *rdlen may be larger than the amount of remaining packet data in the current state of parsing. Values of stack memory locations may be sent over the network in a response."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-130",
              "description": "CWE-130 Improper Handling of Length Parameter Inconsistency",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-11T17:13:52.101Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://web.git.kernel.org/pub/scm/network/connman/connman.git/tree/src/dnsproxy.c?h=1.44#n1001"
        },
        {
          "url": "https://web.git.kernel.org/pub/scm/network/connman/connman.git/tree/src/dnsproxy.c?h=1.44#n988"
        },
        {
          "url": "https://lapis-sawfish-be3.notion.site/0-day-Comman-memory-Leak-190dc00d01d080688472d322c93c4340"
        },
        {
          "url": "https://web.archive.org/web/20250410130356/https://lapis-sawfish-be3.notion.site/0-day-Comman-memory-Leak-190dc00d01d080688472d322c93c4340"
        }
      ],
      "x_generator": {
        "engine": "enrichogram 0.0.1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2025-32366",
    "datePublished": "2025-04-05T00:00:00.000Z",
    "dateReserved": "2025-04-05T00:00:00.000Z",
    "dateUpdated": "2025-04-15T15:15:06.273Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2322 (GCVE-0-2012-2322)
Vulnerability from cvelistv5
Published
2012-05-18 22:00
Modified
2024-08-06 19:26
Severity ?
CWE
  • n/a
Summary
Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:26:08.994Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "53410",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53410"
          },
          {
            "name": "81706",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/81706"
          },
          {
            "name": "connman-dhcp-dos(75420)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420"
          },
          {
            "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
          },
          {
            "name": "GLSA-201205-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
          },
          {
            "name": "[oss-security] 20120507 connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f"
          },
          {
            "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
          },
          {
            "name": "49033",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49033"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
          },
          {
            "name": "49186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49186"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "53410",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53410"
        },
        {
          "name": "81706",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/81706"
        },
        {
          "name": "connman-dhcp-dos(75420)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420"
        },
        {
          "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
        },
        {
          "name": "GLSA-201205-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
        },
        {
          "name": "[oss-security] 20120507 connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f"
        },
        {
          "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
        },
        {
          "name": "49033",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49033"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
        },
        {
          "name": "49186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49186"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-2322",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "53410",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53410"
            },
            {
              "name": "81706",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/81706"
            },
            {
              "name": "connman-dhcp-dos(75420)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420"
            },
            {
              "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
            },
            {
              "name": "GLSA-201205-02",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
            },
            {
              "name": "[oss-security] 20120507 connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
            },
            {
              "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commitdiff;h=1d1a22fe586a455935483708fbe8eaeada79df7f",
              "refsource": "CONFIRM",
              "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commitdiff;h=1d1a22fe586a455935483708fbe8eaeada79df7f"
            },
            {
              "name": "[oss-security] 20120507 Re: connman heads up / CVE requests",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
            },
            {
              "name": "49033",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49033"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=715172",
              "refsource": "MISC",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
            },
            {
              "name": "49186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49186"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2322",
    "datePublished": "2012-05-18T22:00:00",
    "dateReserved": "2012-04-19T00:00:00",
    "dateUpdated": "2024-08-06T19:26:08.994Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2012-05-18 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.
References
secalert@redhat.comhttp://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f
secalert@redhat.comhttp://secunia.com/advisories/49033Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/49186
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201205-02.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/10
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/6
secalert@redhat.comhttp://www.osvdb.org/81706
secalert@redhat.comhttp://www.securityfocus.com/bid/53410
secalert@redhat.comhttps://bugzilla.novell.com/show_bug.cgi?id=715172
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/75420
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49033Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49186
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201205-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/10
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/6
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/81706
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/53410
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.novell.com/show_bug.cgi?id=715172
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/75420
Impacted products
Vendor Product Version
connman connman *
connman connman 0.1
connman connman 0.2
connman connman 0.3
connman connman 0.4
connman connman 0.5
connman connman 0.6
connman connman 0.7
connman connman 0.8
connman connman 0.9
connman connman 0.10
connman connman 0.11
connman connman 0.12
connman connman 0.13
connman connman 0.14
connman connman 0.15
connman connman 0.16
connman connman 0.17
connman connman 0.18
connman connman 0.19
connman connman 0.20
connman connman 0.21
connman connman 0.22
connman connman 0.23
connman connman 0.24
connman connman 0.25
connman connman 0.26
connman connman 0.27
connman connman 0.28
connman connman 0.29
connman connman 0.30
connman connman 0.31
connman connman 0.32
connman connman 0.33
connman connman 0.34
connman connman 0.35
connman connman 0.36
connman connman 0.37
connman connman 0.38
connman connman 0.39
connman connman 0.40
connman connman 0.41
connman connman 0.42
connman connman 0.43
connman connman 0.44
connman connman 0.45
connman connman 0.46
connman connman 0.47
connman connman 0.48
connman connman 0.49
connman connman 0.50
connman connman 0.51
connman connman 0.52
connman connman 0.53
connman connman 0.54
connman connman 0.55
connman connman 0.56
connman connman 0.57
connman connman 0.58
connman connman 0.59
connman connman 0.60
connman connman 0.61
connman connman 0.62
connman connman 0.63
connman connman 0.64
connman connman 0.65
connman connman 0.66
connman connman 0.67
connman connman 0.68
connman connman 0.69
connman connman 0.70
connman connman 0.71
connman connman 0.72
connman connman 0.73
connman connman 0.74
connman connman 0.75
connman connman 0.76
connman connman 0.77
connman connman 0.78
connman connman 0.79
connman connman 0.80
connman connman 0.81
connman connman 0.82
connman connman 0.83



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9",
              "versionEndIncluding": "0.84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n dhcpv6_get_option en gdhcp/client.c en ConnMan antes de v0.85, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y ca\u00edda) mediante un valor de longitud no v\u00e1lida en un paquete DHCP."
    }
  ],
  "id": "CVE-2012-2322",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-05-18T22:55:06.107",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49033"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/49186"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/81706"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/53410"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/81706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53410"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-05-18 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
References
secalert@redhat.comhttp://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a
secalert@redhat.comhttp://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911
secalert@redhat.comhttp://secunia.com/advisories/49033Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/49186
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201205-02.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/10
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/6
secalert@redhat.comhttp://www.osvdb.org/81705
secalert@redhat.comhttp://www.securityfocus.com/bid/53408
secalert@redhat.comhttps://bugzilla.novell.com/show_bug.cgi?id=715172
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/75466
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49033Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49186
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201205-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/10
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/6
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/81705
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/53408
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.novell.com/show_bug.cgi?id=715172
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/75466
Impacted products
Vendor Product Version
connman connman *
connman connman 0.1
connman connman 0.2
connman connman 0.3
connman connman 0.4
connman connman 0.5
connman connman 0.6
connman connman 0.7
connman connman 0.8
connman connman 0.9
connman connman 0.10
connman connman 0.11
connman connman 0.12
connman connman 0.13
connman connman 0.14
connman connman 0.15
connman connman 0.16
connman connman 0.17
connman connman 0.18
connman connman 0.19
connman connman 0.20
connman connman 0.21
connman connman 0.22
connman connman 0.23
connman connman 0.24
connman connman 0.25
connman connman 0.26
connman connman 0.27
connman connman 0.28
connman connman 0.29
connman connman 0.30
connman connman 0.31
connman connman 0.32
connman connman 0.33
connman connman 0.34
connman connman 0.35
connman connman 0.36
connman connman 0.37
connman connman 0.38
connman connman 0.39
connman connman 0.40
connman connman 0.41
connman connman 0.42
connman connman 0.43
connman connman 0.44
connman connman 0.45
connman connman 0.46
connman connman 0.47
connman connman 0.48
connman connman 0.49
connman connman 0.50
connman connman 0.51
connman connman 0.52
connman connman 0.53
connman connman 0.54
connman connman 0.55
connman connman 0.56
connman connman 0.57
connman connman 0.58
connman connman 0.59
connman connman 0.60
connman connman 0.61
connman connman 0.62
connman connman 0.63
connman connman 0.64
connman connman 0.65
connman connman 0.66
connman connman 0.67
connman connman 0.68
connman connman 0.69
connman connman 0.70
connman connman 0.71
connman connman 0.72
connman connman 0.73
connman connman 0.74
connman connman 0.75
connman connman 0.76
connman connman 0.77
connman connman 0.78
connman connman 0.79
connman connman 0.80
connman connman 0.81
connman connman 0.82
connman connman 0.83
connman connman *
connman connman 0.1
connman connman 0.2
connman connman 0.3
connman connman 0.4
connman connman 0.5
connman connman 0.6
connman connman 0.7
connman connman 0.8
connman connman 0.9
connman connman 0.10
connman connman 0.11
connman connman 0.12
connman connman 0.13
connman connman 0.14
connman connman 0.15
connman connman 0.16
connman connman 0.17
connman connman 0.18
connman connman 0.19
connman connman 0.20
connman connman 0.21
connman connman 0.22
connman connman 0.23
connman connman 0.24
connman connman 0.25
connman connman 0.26
connman connman 0.27
connman connman 0.28
connman connman 0.29
connman connman 0.30
connman connman 0.31
connman connman 0.32
connman connman 0.33
connman connman 0.34
connman connman 0.35
connman connman 0.36
connman connman 0.37
connman connman 0.38
connman connman 0.39
connman connman 0.40
connman connman 0.41
connman connman 0.42
connman connman 0.43
connman connman 0.44
connman connman 0.45
connman connman 0.46
connman connman 0.47
connman connman 0.48
connman connman 0.49
connman connman 0.50
connman connman 0.51
connman connman 0.52
connman connman 0.53
connman connman 0.54
connman connman 0.55
connman connman 0.56
connman connman 0.57
connman connman 0.58
connman connman 0.59
connman connman 0.60
connman connman 0.61
connman connman 0.62
connman connman 0.63
connman connman 0.64
connman connman 0.65
connman connman 0.66
connman connman 0.67
connman connman 0.68
connman connman 0.69
connman connman 0.70
connman connman 0.71
connman connman 0.72
connman connman 0.73
connman connman 0.74
connman connman 0.75
connman connman 0.76
connman connman 0.77
connman connman 0.78
connman connman 0.79
connman connman 0.80
connman connman 0.81
connman connman 0.82
connman connman 0.83



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9",
              "versionEndIncluding": "0.84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9",
              "versionEndIncluding": "0.84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply."
    },
    {
      "lang": "es",
      "value": "El bucle de retorno plug-in en ConnMan antes v0.85 permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres en (1) el nombre de host o (2) en nombre de dominio en una respuesta DHCP."
    }
  ],
  "id": "CVE-2012-2321",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-05-18T22:55:06.060",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49033"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/49186"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/81705"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/53408"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/81705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-05-18 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
References
secalert@redhat.comhttp://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618
secalert@redhat.comhttp://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9
secalert@redhat.comhttp://secunia.com/advisories/49033Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/49186
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201205-02.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/10
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/6
secalert@redhat.comhttp://www.osvdb.org/81704
secalert@redhat.comhttp://www.securityfocus.com/bid/53406
secalert@redhat.comhttps://bugzilla.novell.com/show_bug.cgi?id=715172
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/75465
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49033Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49186
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201205-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/10
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/6
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/81704
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/53406
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.novell.com/show_bug.cgi?id=715172
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/75465
Impacted products
Vendor Product Version
connman connman *
connman connman 0.1
connman connman 0.2
connman connman 0.3
connman connman 0.4
connman connman 0.5
connman connman 0.6
connman connman 0.7
connman connman 0.8
connman connman 0.9
connman connman 0.10
connman connman 0.11
connman connman 0.12
connman connman 0.13
connman connman 0.14
connman connman 0.15
connman connman 0.16
connman connman 0.17
connman connman 0.18
connman connman 0.19
connman connman 0.20
connman connman 0.21
connman connman 0.22
connman connman 0.23
connman connman 0.24
connman connman 0.25
connman connman 0.26
connman connman 0.27
connman connman 0.28
connman connman 0.29
connman connman 0.30
connman connman 0.31
connman connman 0.32
connman connman 0.33
connman connman 0.34
connman connman 0.35
connman connman 0.36
connman connman 0.37
connman connman 0.38
connman connman 0.39
connman connman 0.40
connman connman 0.41
connman connman 0.42
connman connman 0.43
connman connman 0.44
connman connman 0.45
connman connman 0.46
connman connman 0.47
connman connman 0.48
connman connman 0.49
connman connman 0.50
connman connman 0.51
connman connman 0.52
connman connman 0.53
connman connman 0.54
connman connman 0.55
connman connman 0.56
connman connman 0.57
connman connman 0.58
connman connman 0.59
connman connman 0.60
connman connman 0.61
connman connman 0.62
connman connman 0.63
connman connman 0.64
connman connman 0.65
connman connman 0.66
connman connman 0.67
connman connman 0.68
connman connman 0.69
connman connman 0.70
connman connman 0.71
connman connman 0.72
connman connman 0.73
connman connman 0.74
connman connman 0.75
connman connman 0.76
connman connman 0.77
connman connman 0.78
connman connman 0.79
connman connman 0.80
connman connman 0.81
connman connman 0.82
connman connman 0.83



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9",
              "versionEndIncluding": "0.84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message."
    },
    {
      "lang": "es",
      "value": "ConnMan antes 0.85 no garantiza que los mensajes netlink se originen en el n\u00facleo, lo que permite a atacantes remotos eludir restricciones de acceso y provocar una denegaci\u00f3n de servicio a trav\u00e9s de un mensaje netlink modificado."
    }
  ],
  "id": "CVE-2012-2320",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-05-18T22:55:06.013",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49033"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/49186"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/81704"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/53406"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/81704"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}