Vulnerabilities
Vulnerable Software
Intel:  >> Connman  >> 1.39  Security Vulnerabilities
client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.
CVSS Score
6.5
EPSS Score
0.0
Published
2023-04-12
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
CVSS Score
9.8
EPSS Score
0.01
Published
2022-08-03
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
CVSS Score
8.1
EPSS Score
0.004
Published
2022-08-03
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
CVSS Score
9.1
EPSS Score
0.0
Published
2022-01-28
An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.
CVSS Score
9.1
EPSS Score
0.0
Published
2022-01-28
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
CVSS Score
7.5
EPSS Score
0.0
Published
2022-01-28


Contact Us

Shodan ® - All rights reserved