Vulnerabilites related to ConnMan - ConnMan
CVE-2012-2321 (GCVE-0-2012-2321)
Vulnerability from cvelistv5
Published
2012-05-18 22:00
Modified
2024-08-06 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:08.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "53408", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53408" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a" }, { "name": "81705", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/81705" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "connman-hostname-command-exec(75466)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466" }, { "name": "49033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49033" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49186" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "53408", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53408" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a" }, { "name": "81705", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/81705" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "connman-hostname-command-exec(75466)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466" }, { "name": "49033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49033" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49186" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2321", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53408", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53408" }, { "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=26ace5c59f790bce0f1988b88874c6f2c480fd5a", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=26ace5c59f790bce0f1988b88874c6f2c480fd5a" }, { "name": "81705", "refsource": "OSVDB", "url": "http://www.osvdb.org/81705" }, { "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "connman-hostname-command-exec(75466)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466" }, { "name": "49033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49033" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=715172", "refsource": "MISC", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49186" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2321", "datePublished": "2012-05-18T22:00:00", "dateReserved": "2012-04-19T00:00:00", "dateUpdated": "2024-08-06T19:26:08.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-32743 (GCVE-0-2025-32743)
Vulnerability from cvelistv5
Published
2025-04-10 00:00
Modified
2025-04-10 14:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-392 - Missing Report of Error Condition
Summary
In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-32743", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-10T14:30:10.050718Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-10T14:30:27.850Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "ConnMan", "vendor": "ConnMan", "versions": [ { "lessThanOrEqual": "1.44", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.44", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-392", "description": "CWE-392 Missing Report of Error Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-10T13:24:48.982Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://web.git.kernel.org/pub/scm/network/connman/connman.git/tree/src/dnsproxy.c?h=1.44#n1688" }, { "url": "https://lapis-sawfish-be3.notion.site/0-click-Vulnerability-in-Comman-1-43_v3-1cadc00d01d080b0b3b9c46a6da584cc" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2025-32743", "datePublished": "2025-04-10T00:00:00.000Z", "dateReserved": "2025-04-10T00:00:00.000Z", "dateUpdated": "2025-04-10T14:30:27.850Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2320 (GCVE-0-2012-2320)
Vulnerability from cvelistv5
Published
2012-05-18 22:00
Modified
2024-08-06 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:09.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "connman-netlink-security-bypass(75465)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618" }, { "name": "81704", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/81704" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "name": "53406", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53406" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "49033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49033" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49186" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "connman-netlink-security-bypass(75465)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618" }, { "name": "81704", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/81704" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "name": "53406", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53406" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "49033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49033" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49186" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2320", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "connman-netlink-security-bypass(75465)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465" }, { "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618" }, { "name": "81704", "refsource": "OSVDB", "url": "http://www.osvdb.org/81704" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=c1b968984212b46bea1330f5ae029507b9bfded9", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commit;h=c1b968984212b46bea1330f5ae029507b9bfded9" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "name": "53406", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53406" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "49033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49033" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=715172", "refsource": "MISC", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49186" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2320", "datePublished": "2012-05-18T22:00:00", "dateReserved": "2012-04-19T00:00:00", "dateUpdated": "2024-08-06T19:26:09.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-32366 (GCVE-0-2025-32366)
Vulnerability from cvelistv5
Published
2025-04-05 00:00
Modified
2025-04-15 15:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-130 - Improper Handling of Length Parameter Inconsistency
Summary
In ConnMan through 1.44, parse_rr in dnsproxy.c has a memcpy length that depends on an RR RDLENGTH value, i.e., *rdlen=ntohs(rr->rdlen) and memcpy(response+offset,*end,*rdlen) without a check for whether the sum of *end and *rdlen exceeds max. Consequently, *rdlen may be larger than the amount of remaining packet data in the current state of parsing. Values of stack memory locations may be sent over the network in a response.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-32366", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:42:05.651515Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T15:15:06.273Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ConnMan", "vendor": "ConnMan", "versions": [ { "lessThanOrEqual": "1.44", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.44", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In ConnMan through 1.44, parse_rr in dnsproxy.c has a memcpy length that depends on an RR RDLENGTH value, i.e., *rdlen=ntohs(rr-\u003erdlen) and memcpy(response+offset,*end,*rdlen) without a check for whether the sum of *end and *rdlen exceeds max. Consequently, *rdlen may be larger than the amount of remaining packet data in the current state of parsing. Values of stack memory locations may be sent over the network in a response." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-11T17:13:52.101Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://web.git.kernel.org/pub/scm/network/connman/connman.git/tree/src/dnsproxy.c?h=1.44#n1001" }, { "url": "https://web.git.kernel.org/pub/scm/network/connman/connman.git/tree/src/dnsproxy.c?h=1.44#n988" }, { "url": "https://lapis-sawfish-be3.notion.site/0-day-Comman-memory-Leak-190dc00d01d080688472d322c93c4340" }, { "url": "https://web.archive.org/web/20250410130356/https://lapis-sawfish-be3.notion.site/0-day-Comman-memory-Leak-190dc00d01d080688472d322c93c4340" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2025-32366", "datePublished": "2025-04-05T00:00:00.000Z", "dateReserved": "2025-04-05T00:00:00.000Z", "dateUpdated": "2025-04-15T15:15:06.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2322 (GCVE-0-2012-2322)
Vulnerability from cvelistv5
Published
2012-05-18 22:00
Modified
2024-08-06 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:08.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "53410", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53410" }, { "name": "81706", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/81706" }, { "name": "connman-dhcp-dos(75420)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "49033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49033" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49186" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-05-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "53410", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53410" }, { "name": "81706", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/81706" }, { "name": "connman-dhcp-dos(75420)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "49033", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49033" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49186" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53410", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53410" }, { "name": "81706", "refsource": "OSVDB", "url": "http://www.osvdb.org/81706" }, { "name": "connman-dhcp-dos(75420)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "name": "GLSA-201205-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "name": "[oss-security] 20120507 connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "name": "http://git.kernel.org/?p=network/connman/connman.git;a=commitdiff;h=1d1a22fe586a455935483708fbe8eaeada79df7f", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=network/connman/connman.git;a=commitdiff;h=1d1a22fe586a455935483708fbe8eaeada79df7f" }, { "name": "[oss-security] 20120507 Re: connman heads up / CVE requests", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "name": "49033", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49033" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=715172", "refsource": "MISC", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "name": "49186", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49186" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2322", "datePublished": "2012-05-18T22:00:00", "dateReserved": "2012-04-19T00:00:00", "dateUpdated": "2024-08-06T19:26:08.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-05-18 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f | ||
secalert@redhat.com | http://secunia.com/advisories/49033 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/49186 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201205-02.xml | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/10 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/2 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/6 | ||
secalert@redhat.com | http://www.osvdb.org/81706 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/53410 | ||
secalert@redhat.com | https://bugzilla.novell.com/show_bug.cgi?id=715172 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/75420 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49033 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49186 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201205-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/10 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/6 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/81706 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53410 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=715172 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75420 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
connman | connman | * | |
connman | connman | 0.1 | |
connman | connman | 0.2 | |
connman | connman | 0.3 | |
connman | connman | 0.4 | |
connman | connman | 0.5 | |
connman | connman | 0.6 | |
connman | connman | 0.7 | |
connman | connman | 0.8 | |
connman | connman | 0.9 | |
connman | connman | 0.10 | |
connman | connman | 0.11 | |
connman | connman | 0.12 | |
connman | connman | 0.13 | |
connman | connman | 0.14 | |
connman | connman | 0.15 | |
connman | connman | 0.16 | |
connman | connman | 0.17 | |
connman | connman | 0.18 | |
connman | connman | 0.19 | |
connman | connman | 0.20 | |
connman | connman | 0.21 | |
connman | connman | 0.22 | |
connman | connman | 0.23 | |
connman | connman | 0.24 | |
connman | connman | 0.25 | |
connman | connman | 0.26 | |
connman | connman | 0.27 | |
connman | connman | 0.28 | |
connman | connman | 0.29 | |
connman | connman | 0.30 | |
connman | connman | 0.31 | |
connman | connman | 0.32 | |
connman | connman | 0.33 | |
connman | connman | 0.34 | |
connman | connman | 0.35 | |
connman | connman | 0.36 | |
connman | connman | 0.37 | |
connman | connman | 0.38 | |
connman | connman | 0.39 | |
connman | connman | 0.40 | |
connman | connman | 0.41 | |
connman | connman | 0.42 | |
connman | connman | 0.43 | |
connman | connman | 0.44 | |
connman | connman | 0.45 | |
connman | connman | 0.46 | |
connman | connman | 0.47 | |
connman | connman | 0.48 | |
connman | connman | 0.49 | |
connman | connman | 0.50 | |
connman | connman | 0.51 | |
connman | connman | 0.52 | |
connman | connman | 0.53 | |
connman | connman | 0.54 | |
connman | connman | 0.55 | |
connman | connman | 0.56 | |
connman | connman | 0.57 | |
connman | connman | 0.58 | |
connman | connman | 0.59 | |
connman | connman | 0.60 | |
connman | connman | 0.61 | |
connman | connman | 0.62 | |
connman | connman | 0.63 | |
connman | connman | 0.64 | |
connman | connman | 0.65 | |
connman | connman | 0.66 | |
connman | connman | 0.67 | |
connman | connman | 0.68 | |
connman | connman | 0.69 | |
connman | connman | 0.70 | |
connman | connman | 0.71 | |
connman | connman | 0.72 | |
connman | connman | 0.73 | |
connman | connman | 0.74 | |
connman | connman | 0.75 | |
connman | connman | 0.76 | |
connman | connman | 0.77 | |
connman | connman | 0.78 | |
connman | connman | 0.79 | |
connman | connman | 0.80 | |
connman | connman | 0.81 | |
connman | connman | 0.82 | |
connman | connman | 0.83 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9", "versionEndIncluding": "0.84", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*", "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*", "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*", "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*", "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*", "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*", "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*", "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*", "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*", "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*", "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*", "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*", "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*", "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*", "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*", "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*", "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*", "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*", "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*", "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*", "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*", "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*", "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*", "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*", "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*", "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*", "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*", "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*", "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*", "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*", "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*", "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*", "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*", "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*", "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*", "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*", "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*", "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*", "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*", "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*", "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*", "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*", "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*", "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*", "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*", "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*", "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*", "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*", "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*", "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*", "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*", "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*", "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*", "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*", "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*", "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*", "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*", "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*", "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*", "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*", "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet." }, { "lang": "es", "value": "Desbordamiento de entero en la funci\u00f3n dhcpv6_get_option en gdhcp/client.c en ConnMan antes de v0.85, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y ca\u00edda) mediante un valor de longitud no v\u00e1lida en un paquete DHCP." } ], "id": "CVE-2012-2322", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-18T22:55:06.107", "references": [ { "source": "secalert@redhat.com", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49033" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/49186" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/81706" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53410" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commitdiff%3Bh=1d1a22fe586a455935483708fbe8eaeada79df7f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/81706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75420" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-18 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a | ||
secalert@redhat.com | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911 | ||
secalert@redhat.com | http://secunia.com/advisories/49033 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/49186 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201205-02.xml | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/10 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/2 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/6 | ||
secalert@redhat.com | http://www.osvdb.org/81705 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/53408 | ||
secalert@redhat.com | https://bugzilla.novell.com/show_bug.cgi?id=715172 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/75466 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49033 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49186 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201205-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/10 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/6 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/81705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53408 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=715172 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75466 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
connman | connman | * | |
connman | connman | 0.1 | |
connman | connman | 0.2 | |
connman | connman | 0.3 | |
connman | connman | 0.4 | |
connman | connman | 0.5 | |
connman | connman | 0.6 | |
connman | connman | 0.7 | |
connman | connman | 0.8 | |
connman | connman | 0.9 | |
connman | connman | 0.10 | |
connman | connman | 0.11 | |
connman | connman | 0.12 | |
connman | connman | 0.13 | |
connman | connman | 0.14 | |
connman | connman | 0.15 | |
connman | connman | 0.16 | |
connman | connman | 0.17 | |
connman | connman | 0.18 | |
connman | connman | 0.19 | |
connman | connman | 0.20 | |
connman | connman | 0.21 | |
connman | connman | 0.22 | |
connman | connman | 0.23 | |
connman | connman | 0.24 | |
connman | connman | 0.25 | |
connman | connman | 0.26 | |
connman | connman | 0.27 | |
connman | connman | 0.28 | |
connman | connman | 0.29 | |
connman | connman | 0.30 | |
connman | connman | 0.31 | |
connman | connman | 0.32 | |
connman | connman | 0.33 | |
connman | connman | 0.34 | |
connman | connman | 0.35 | |
connman | connman | 0.36 | |
connman | connman | 0.37 | |
connman | connman | 0.38 | |
connman | connman | 0.39 | |
connman | connman | 0.40 | |
connman | connman | 0.41 | |
connman | connman | 0.42 | |
connman | connman | 0.43 | |
connman | connman | 0.44 | |
connman | connman | 0.45 | |
connman | connman | 0.46 | |
connman | connman | 0.47 | |
connman | connman | 0.48 | |
connman | connman | 0.49 | |
connman | connman | 0.50 | |
connman | connman | 0.51 | |
connman | connman | 0.52 | |
connman | connman | 0.53 | |
connman | connman | 0.54 | |
connman | connman | 0.55 | |
connman | connman | 0.56 | |
connman | connman | 0.57 | |
connman | connman | 0.58 | |
connman | connman | 0.59 | |
connman | connman | 0.60 | |
connman | connman | 0.61 | |
connman | connman | 0.62 | |
connman | connman | 0.63 | |
connman | connman | 0.64 | |
connman | connman | 0.65 | |
connman | connman | 0.66 | |
connman | connman | 0.67 | |
connman | connman | 0.68 | |
connman | connman | 0.69 | |
connman | connman | 0.70 | |
connman | connman | 0.71 | |
connman | connman | 0.72 | |
connman | connman | 0.73 | |
connman | connman | 0.74 | |
connman | connman | 0.75 | |
connman | connman | 0.76 | |
connman | connman | 0.77 | |
connman | connman | 0.78 | |
connman | connman | 0.79 | |
connman | connman | 0.80 | |
connman | connman | 0.81 | |
connman | connman | 0.82 | |
connman | connman | 0.83 | |
connman | connman | * | |
connman | connman | 0.1 | |
connman | connman | 0.2 | |
connman | connman | 0.3 | |
connman | connman | 0.4 | |
connman | connman | 0.5 | |
connman | connman | 0.6 | |
connman | connman | 0.7 | |
connman | connman | 0.8 | |
connman | connman | 0.9 | |
connman | connman | 0.10 | |
connman | connman | 0.11 | |
connman | connman | 0.12 | |
connman | connman | 0.13 | |
connman | connman | 0.14 | |
connman | connman | 0.15 | |
connman | connman | 0.16 | |
connman | connman | 0.17 | |
connman | connman | 0.18 | |
connman | connman | 0.19 | |
connman | connman | 0.20 | |
connman | connman | 0.21 | |
connman | connman | 0.22 | |
connman | connman | 0.23 | |
connman | connman | 0.24 | |
connman | connman | 0.25 | |
connman | connman | 0.26 | |
connman | connman | 0.27 | |
connman | connman | 0.28 | |
connman | connman | 0.29 | |
connman | connman | 0.30 | |
connman | connman | 0.31 | |
connman | connman | 0.32 | |
connman | connman | 0.33 | |
connman | connman | 0.34 | |
connman | connman | 0.35 | |
connman | connman | 0.36 | |
connman | connman | 0.37 | |
connman | connman | 0.38 | |
connman | connman | 0.39 | |
connman | connman | 0.40 | |
connman | connman | 0.41 | |
connman | connman | 0.42 | |
connman | connman | 0.43 | |
connman | connman | 0.44 | |
connman | connman | 0.45 | |
connman | connman | 0.46 | |
connman | connman | 0.47 | |
connman | connman | 0.48 | |
connman | connman | 0.49 | |
connman | connman | 0.50 | |
connman | connman | 0.51 | |
connman | connman | 0.52 | |
connman | connman | 0.53 | |
connman | connman | 0.54 | |
connman | connman | 0.55 | |
connman | connman | 0.56 | |
connman | connman | 0.57 | |
connman | connman | 0.58 | |
connman | connman | 0.59 | |
connman | connman | 0.60 | |
connman | connman | 0.61 | |
connman | connman | 0.62 | |
connman | connman | 0.63 | |
connman | connman | 0.64 | |
connman | connman | 0.65 | |
connman | connman | 0.66 | |
connman | connman | 0.67 | |
connman | connman | 0.68 | |
connman | connman | 0.69 | |
connman | connman | 0.70 | |
connman | connman | 0.71 | |
connman | connman | 0.72 | |
connman | connman | 0.73 | |
connman | connman | 0.74 | |
connman | connman | 0.75 | |
connman | connman | 0.76 | |
connman | connman | 0.77 | |
connman | connman | 0.78 | |
connman | connman | 0.79 | |
connman | connman | 0.80 | |
connman | connman | 0.81 | |
connman | connman | 0.82 | |
connman | connman | 0.83 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9", "versionEndIncluding": "0.84", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*", "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*", "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*", "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*", "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*", "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*", "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*", "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*", "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*", "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*", "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*", "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*", "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*", "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*", "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*", "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*", "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*", "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*", "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*", "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*", "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*", "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*", "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*", "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*", "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*", "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*", "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*", "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*", "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*", "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*", "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*", "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*", "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*", "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*", "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*", "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*", "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*", "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*", "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*", "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*", "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*", "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*", "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*", "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*", "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*", "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*", "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*", "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*", "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*", "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*", "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*", "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*", "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*", "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*", "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*", "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*", "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*", "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*", "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*", "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*", "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9", "versionEndIncluding": "0.84", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*", "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*", "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*", "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*", "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*", "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*", "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*", "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*", "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*", "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*", "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*", "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*", "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*", "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*", "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*", "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*", "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*", "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*", "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*", "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*", "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*", "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*", "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*", "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*", "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*", "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*", "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*", "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*", "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*", "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*", "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*", "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*", "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*", "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*", "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*", "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*", "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*", "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*", "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*", "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*", "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*", "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*", "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*", "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*", "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*", "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*", "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*", "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*", "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*", "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*", "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*", "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*", "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*", "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*", "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*", "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*", "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*", "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*", "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*", "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*", "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply." }, { "lang": "es", "value": "El bucle de retorno plug-in en ConnMan antes v0.85 permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacaracteres en (1) el nombre de host o (2) en nombre de dominio en una respuesta DHCP." } ], "id": "CVE-2012-2321", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-18T22:55:06.060", "references": [ { "source": "secalert@redhat.com", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a" }, { "source": "secalert@redhat.com", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49033" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/49186" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/81705" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53408" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=26ace5c59f790bce0f1988b88874c6f2c480fd5a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=a5f540db7354b76bcabd0a05d8eb8ba2bff4e911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/81705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75466" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-05-18 22:55
Modified
2025-04-11 00:51
Severity ?
Summary
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618 | ||
secalert@redhat.com | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9 | ||
secalert@redhat.com | http://secunia.com/advisories/49033 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/49186 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201205-02.xml | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/10 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/2 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2012/05/07/6 | ||
secalert@redhat.com | http://www.osvdb.org/81704 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/53406 | ||
secalert@redhat.com | https://bugzilla.novell.com/show_bug.cgi?id=715172 | ||
secalert@redhat.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/75465 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49033 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49186 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201205-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/10 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2012/05/07/6 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/81704 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/53406 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.novell.com/show_bug.cgi?id=715172 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/75465 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
connman | connman | * | |
connman | connman | 0.1 | |
connman | connman | 0.2 | |
connman | connman | 0.3 | |
connman | connman | 0.4 | |
connman | connman | 0.5 | |
connman | connman | 0.6 | |
connman | connman | 0.7 | |
connman | connman | 0.8 | |
connman | connman | 0.9 | |
connman | connman | 0.10 | |
connman | connman | 0.11 | |
connman | connman | 0.12 | |
connman | connman | 0.13 | |
connman | connman | 0.14 | |
connman | connman | 0.15 | |
connman | connman | 0.16 | |
connman | connman | 0.17 | |
connman | connman | 0.18 | |
connman | connman | 0.19 | |
connman | connman | 0.20 | |
connman | connman | 0.21 | |
connman | connman | 0.22 | |
connman | connman | 0.23 | |
connman | connman | 0.24 | |
connman | connman | 0.25 | |
connman | connman | 0.26 | |
connman | connman | 0.27 | |
connman | connman | 0.28 | |
connman | connman | 0.29 | |
connman | connman | 0.30 | |
connman | connman | 0.31 | |
connman | connman | 0.32 | |
connman | connman | 0.33 | |
connman | connman | 0.34 | |
connman | connman | 0.35 | |
connman | connman | 0.36 | |
connman | connman | 0.37 | |
connman | connman | 0.38 | |
connman | connman | 0.39 | |
connman | connman | 0.40 | |
connman | connman | 0.41 | |
connman | connman | 0.42 | |
connman | connman | 0.43 | |
connman | connman | 0.44 | |
connman | connman | 0.45 | |
connman | connman | 0.46 | |
connman | connman | 0.47 | |
connman | connman | 0.48 | |
connman | connman | 0.49 | |
connman | connman | 0.50 | |
connman | connman | 0.51 | |
connman | connman | 0.52 | |
connman | connman | 0.53 | |
connman | connman | 0.54 | |
connman | connman | 0.55 | |
connman | connman | 0.56 | |
connman | connman | 0.57 | |
connman | connman | 0.58 | |
connman | connman | 0.59 | |
connman | connman | 0.60 | |
connman | connman | 0.61 | |
connman | connman | 0.62 | |
connman | connman | 0.63 | |
connman | connman | 0.64 | |
connman | connman | 0.65 | |
connman | connman | 0.66 | |
connman | connman | 0.67 | |
connman | connman | 0.68 | |
connman | connman | 0.69 | |
connman | connman | 0.70 | |
connman | connman | 0.71 | |
connman | connman | 0.72 | |
connman | connman | 0.73 | |
connman | connman | 0.74 | |
connman | connman | 0.75 | |
connman | connman | 0.76 | |
connman | connman | 0.77 | |
connman | connman | 0.78 | |
connman | connman | 0.79 | |
connman | connman | 0.80 | |
connman | connman | 0.81 | |
connman | connman | 0.82 | |
connman | connman | 0.83 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9", "versionEndIncluding": "0.84", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*", "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*", "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*", "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*", "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*", "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*", "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*", "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*", "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*", "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*", "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*", "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*", "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*", "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*", "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*", "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*", "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*", "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*", "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*", "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*", "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*", "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*", "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*", "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*", "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*", "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*", "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*", "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*", "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*", "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*", "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*", "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*", "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*", "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*", "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*", "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*", "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*", "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*", "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*", "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*", "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*", "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*", "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*", "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*", "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*", "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*", "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*", "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*", "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*", "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*", "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*", "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*", "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*", "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*", "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*", "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*", "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*", "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*", "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*", "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*", "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*", "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*", "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*", "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*", "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*", "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*", "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*", "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49", "vulnerable": true }, { "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*", "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message." }, { "lang": "es", "value": "ConnMan antes 0.85 no garantiza que los mensajes netlink se originen en el n\u00facleo, lo que permite a atacantes remotos eludir restricciones de acceso y provocar una denegaci\u00f3n de servicio a trav\u00e9s de un mensaje netlink modificado." } ], "id": "CVE-2012-2320", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-18T22:55:06.013", "references": [ { "source": "secalert@redhat.com", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618" }, { "source": "secalert@redhat.com", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49033" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/49186" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/81704" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53406" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/81704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }