First published: Wed Aug 03 2022(Updated: )
In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HTTP query could be used to trigger a use-after-free in WISPR handling, leading to crashes or code execution.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Connman | <=1.41 | |
Debian Debian Linux | =11.0 | |
debian/connman | <=1.36-2.1~deb10u2 | 1.36-2.1~deb10u5 1.36-2.2+deb11u2 1.41-3 1.42-5 |
ubuntu/connman | <1.35-6ubuntu0.1~ | 1.35-6ubuntu0.1~ |
ubuntu/connman | <1.36-2ubuntu0.1 | 1.36-2ubuntu0.1 |
ubuntu/connman | <1.36-2.3ubuntu0.1 | 1.36-2.3ubuntu0.1 |
ubuntu/connman | <1.21-1.2+ | 1.21-1.2+ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32293 is a vulnerability in ConnMan through 1.41 that could allow a man-in-the-middle attack against a WISPR HTTP query, leading to crashes or code execution.
CVE-2022-32293 has a severity rating of 8.1 (high).
The versions of ConnMan affected by CVE-2022-32293 include: 1.36-2.1~deb10u5, 1.36-2.2+deb11u2, and 1.41-3.
Yes, the following fixed versions are available: 1.36-2.1~deb10u2 for debian/connman, 1.35-6ubuntu0.1~ for ubuntu/connman (bionic), 1.36-2ubuntu0.1 for ubuntu/connman (focal), and 1.36-2.3ubuntu0.1 for ubuntu/connman (jammy).
The CWE ID for CVE-2022-32293 is CWE-416.