ALT-PU-2021-2716-1
Closed vulnerabilities
Published: 2021-12-28
Modified: 2024-09-13
Modified: 2024-09-13
BDU:2021-06407
Уязвимость пакета dnsproxy диспетчера соединений Connman, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
Severity: CRITICAL (9.8)
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
References:
Published: 2021-06-09
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-33833
ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).
Severity: HIGH (7.5)
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: CRITICAL (9.8)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://www.openwall.com/lists/oss-security/2021/06/09/1
- http://www.openwall.com/lists/oss-security/2022/01/25/1
- https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html
- https://lore.kernel.org/connman/
- https://security.gentoo.org/glsa/202107-29
- http://www.openwall.com/lists/oss-security/2021/06/09/1
- http://www.openwall.com/lists/oss-security/2022/01/25/1
- https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html
- https://lore.kernel.org/connman/
- https://security.gentoo.org/glsa/202107-29