Intel ConnMan 0.31

CPE Details

Intel ConnMan 0.31
0.31
2020-03-05
18h13 +00:00
2020-03-05
18h13 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:intel:connman:0.31:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

connman

Version

0.31

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-32292 2022-08-02 22h00 +00:00 In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
9.8
Critical
CVE-2022-32293 2022-08-02 22h00 +00:00 In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
8.1
High
CVE-2022-23096 2022-01-27 23h00 +00:00 An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.
9.1
Critical
CVE-2022-23097 2022-01-27 23h00 +00:00 An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read.
9.1
Critical
CVE-2022-23098 2022-01-27 23h00 +00:00 An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received.
7.5
High
CVE-2021-26676 2021-02-09 14h47 +00:00 gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp.
6.5
Medium
CVE-2021-26675 2021-02-09 14h47 +00:00 A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
8.8
High
CVE-2017-12865 2017-08-29 14h00 +00:00 Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
9.8
Critical