First published: Fri May 18 2012(Updated: )
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ConnMan | <=0.84 | |
ConnMan | =0.1 | |
ConnMan | =0.2 | |
ConnMan | =0.3 | |
ConnMan | =0.4 | |
ConnMan | =0.5 | |
ConnMan | =0.6 | |
ConnMan | =0.7 | |
ConnMan | =0.8 | |
ConnMan | =0.9 | |
ConnMan | =0.10 | |
ConnMan | =0.11 | |
ConnMan | =0.12 | |
ConnMan | =0.13 | |
ConnMan | =0.14 | |
ConnMan | =0.15 | |
ConnMan | =0.16 | |
ConnMan | =0.17 | |
ConnMan | =0.18 | |
ConnMan | =0.19 | |
ConnMan | =0.20 | |
ConnMan | =0.21 | |
ConnMan | =0.22 | |
ConnMan | =0.23 | |
ConnMan | =0.24 | |
ConnMan | =0.25 | |
ConnMan | =0.26 | |
ConnMan | =0.27 | |
ConnMan | =0.28 | |
ConnMan | =0.29 | |
ConnMan | =0.30 | |
ConnMan | =0.31 | |
ConnMan | =0.32 | |
ConnMan | =0.33 | |
ConnMan | =0.34 | |
ConnMan | =0.35 | |
ConnMan | =0.36 | |
ConnMan | =0.37 | |
ConnMan | =0.38 | |
ConnMan | =0.39 | |
ConnMan | =0.40 | |
ConnMan | =0.41 | |
ConnMan | =0.42 | |
ConnMan | =0.43 | |
ConnMan | =0.44 | |
ConnMan | =0.45 | |
ConnMan | =0.46 | |
ConnMan | =0.47 | |
ConnMan | =0.48 | |
ConnMan | =0.49 | |
ConnMan | =0.50 | |
ConnMan | =0.51 | |
ConnMan | =0.52 | |
ConnMan | =0.53 | |
ConnMan | =0.54 | |
ConnMan | =0.55 | |
ConnMan | =0.56 | |
ConnMan | =0.57 | |
ConnMan | =0.58 | |
ConnMan | =0.59 | |
ConnMan | =0.60 | |
ConnMan | =0.61 | |
ConnMan | =0.62 | |
ConnMan | =0.63 | |
ConnMan | =0.64 | |
ConnMan | =0.65 | |
ConnMan | =0.66 | |
ConnMan | =0.67 | |
ConnMan | =0.68 | |
ConnMan | =0.69 | |
ConnMan | =0.70 | |
ConnMan | =0.71 | |
ConnMan | =0.72 | |
ConnMan | =0.73 | |
ConnMan | =0.74 | |
ConnMan | =0.75 | |
ConnMan | =0.76 | |
ConnMan | =0.77 | |
ConnMan | =0.78 | |
ConnMan | =0.79 | |
ConnMan | =0.80 | |
ConnMan | =0.81 | |
ConnMan | =0.82 | |
ConnMan | =0.83 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2320 is considered a moderate severity vulnerability as it allows remote attackers to cause a denial of service.
To fix CVE-2012-2320, update ConnMan to version 0.85 or later, where this issue has been addressed.
CVE-2012-2320 enables attackers to send crafted netlink messages that can bypass access restrictions and potentially crash the system.
CVE-2012-2320 affects ConnMan versions prior to 0.85, including all versions from 0.1 to 0.84.
Yes, CVE-2012-2320 is exploitable remotely, allowing attackers to send malicious messages without physical access to the device.