First published: Wed Aug 03 2022(Updated: )
In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Connman | <=1.41 | |
Debian Debian Linux | =11.0 | |
debian/connman | <=1.36-2.1~deb10u2 | 1.36-2.1~deb10u5 1.36-2.2+deb11u2 1.41-3 1.42-5 |
ubuntu/connman | <1.36-2ubuntu0.1 | 1.36-2ubuntu0.1 |
ubuntu/connman | <1.36-2.3ubuntu0.1 | 1.36-2.3ubuntu0.1 |
ubuntu/connman | <1.35-6ubuntu0.1~ | 1.35-6ubuntu0.1~ |
ubuntu/connman | <1.21-1.2+ | 1.21-1.2+ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-32292.
The title of the vulnerability is 'In ConnMan through 1.41 remote attackers able to send HTTP requests to the gweb component are able to...'
The description of the vulnerability is 'In ConnMan through 1.41, remote attackers able to send HTTP requests to the gweb component are able to exploit a heap-based buffer overflow in received_data to execute code.'
The affected software versions are 1.36-2.1~deb10u5, 1.36-2.2+deb11u1, 1.36-2.2+deb11u2, and 1.41-3.
The fix for this vulnerability depends on the affected software package. Please refer to the provided references for the specific remedy.
The references for this vulnerability are 'https://lore.kernel.org/connman/20220801080043.4861-5-wagi@monom.org/', 'https://bugzilla.suse.com/show_bug.cgi?id=1200189', and 'https://www.debian.org/security/2022/dsa-5231'.
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-119.