First published: Tue Feb 09 2021(Updated: )
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Connman | <1.39 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.2 | |
debian/connman | 1.36-2.1~deb10u2 1.36-2.1~deb10u5 1.36-2.2+deb11u2 1.41-3 1.42-5 | |
ubuntu/connman | <1.36-2.1 | 1.36-2.1 |
ubuntu/connman | <1.35-6ubuntu0.1~ | 1.35-6ubuntu0.1~ |
ubuntu/connman | <1.36-2ubuntu0.1 | 1.36-2ubuntu0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-26675.
The severity of CVE-2021-26675 is high, with a severity value of 8.8.
The affected software is ConnMan versions 1.36-2.1 and earlier.
Network adjacent attackers can exploit CVE-2021-26675 to execute code by triggering a stack-based buffer overflow in dnsproxy.
You can find more information about CVE-2021-26675 at the following references: [link-1], [link-2], [link-3].