First published: Fri May 18 2012(Updated: )
Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ConnMan | <=0.84 | |
ConnMan | =0.1 | |
ConnMan | =0.2 | |
ConnMan | =0.3 | |
ConnMan | =0.4 | |
ConnMan | =0.5 | |
ConnMan | =0.6 | |
ConnMan | =0.7 | |
ConnMan | =0.8 | |
ConnMan | =0.9 | |
ConnMan | =0.10 | |
ConnMan | =0.11 | |
ConnMan | =0.12 | |
ConnMan | =0.13 | |
ConnMan | =0.14 | |
ConnMan | =0.15 | |
ConnMan | =0.16 | |
ConnMan | =0.17 | |
ConnMan | =0.18 | |
ConnMan | =0.19 | |
ConnMan | =0.20 | |
ConnMan | =0.21 | |
ConnMan | =0.22 | |
ConnMan | =0.23 | |
ConnMan | =0.24 | |
ConnMan | =0.25 | |
ConnMan | =0.26 | |
ConnMan | =0.27 | |
ConnMan | =0.28 | |
ConnMan | =0.29 | |
ConnMan | =0.30 | |
ConnMan | =0.31 | |
ConnMan | =0.32 | |
ConnMan | =0.33 | |
ConnMan | =0.34 | |
ConnMan | =0.35 | |
ConnMan | =0.36 | |
ConnMan | =0.37 | |
ConnMan | =0.38 | |
ConnMan | =0.39 | |
ConnMan | =0.40 | |
ConnMan | =0.41 | |
ConnMan | =0.42 | |
ConnMan | =0.43 | |
ConnMan | =0.44 | |
ConnMan | =0.45 | |
ConnMan | =0.46 | |
ConnMan | =0.47 | |
ConnMan | =0.48 | |
ConnMan | =0.49 | |
ConnMan | =0.50 | |
ConnMan | =0.51 | |
ConnMan | =0.52 | |
ConnMan | =0.53 | |
ConnMan | =0.54 | |
ConnMan | =0.55 | |
ConnMan | =0.56 | |
ConnMan | =0.57 | |
ConnMan | =0.58 | |
ConnMan | =0.59 | |
ConnMan | =0.60 | |
ConnMan | =0.61 | |
ConnMan | =0.62 | |
ConnMan | =0.63 | |
ConnMan | =0.64 | |
ConnMan | =0.65 | |
ConnMan | =0.66 | |
ConnMan | =0.67 | |
ConnMan | =0.68 | |
ConnMan | =0.69 | |
ConnMan | =0.70 | |
ConnMan | =0.71 | |
ConnMan | =0.72 | |
ConnMan | =0.73 | |
ConnMan | =0.74 | |
ConnMan | =0.75 | |
ConnMan | =0.76 | |
ConnMan | =0.77 | |
ConnMan | =0.78 | |
ConnMan | =0.79 | |
ConnMan | =0.80 | |
ConnMan | =0.81 | |
ConnMan | =0.82 | |
ConnMan | =0.83 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2322 has a severity rating classified as high due to its potential to cause denial of service.
To fix CVE-2012-2322, you should update ConnMan to version 0.85 or later.
CVE-2012-2322 affects all ConnMan versions prior to 0.85, including all versions starting from 0.1 up to 0.84.
CVE-2012-2322 is an integer overflow vulnerability that leads to denial of service.
Yes, CVE-2012-2322 can be exploited remotely by sending a specially crafted DHCP packet.