First published: Wed Jun 09 2021(Updated: )
ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Connection Manager | >=1.30<=1.39 | |
Debian Debian Linux | =9.0 | |
debian/connman | 1.36-2.1~deb10u2 1.36-2.1~deb10u5 1.36-2.2+deb11u2 1.41-3 1.42-5 | |
ubuntu/connman | <1.35-6ubuntu0.1~ | 1.35-6ubuntu0.1~ |
ubuntu/connman | <1.36-2ubuntu0.1 | 1.36-2ubuntu0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33833 is a stack-based buffer overflow in ConnMan (Connection Manager) 1.30 through 1.39, specifically in the uncompress function in dnsproxy.c via NAME, RDATA, or RDLENGTH.
CVE-2021-33833 has a severity rating of 9.8, which is considered critical.
ConnMan versions 1.30 through 1.39 are affected by CVE-2021-33833.
To fix CVE-2021-33833, update to ConnMan version 1.35-6ubuntu0.1~ for Ubuntu Bionic, 1.36-2ubuntu0.1 for Ubuntu Focal, or apply the appropriate remedy provided by Debian if running a Debian-based system.
You can find more information about CVE-2021-33833 at the following references: [https://lore.kernel.org/connman/](https://lore.kernel.org/connman/), [http://www.openwall.com/lists/oss-security/2021/06/09/1](http://www.openwall.com/lists/oss-security/2021/06/09/1), [https://security.gentoo.org/glsa/202107-29](https://security.gentoo.org/glsa/202107-29).