SB2012051901 - Multiple vulnerabilities in aldebaran connman



SB2012051901 - Multiple vulnerabilities in aldebaran connman

Published: May 19, 2012 Updated: August 11, 2020

Security Bulletin ID SB2012051901
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-2320)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.


2) Input validation error (CVE-ID: CVE-2012-2321)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.


3) Input validation error (CVE-ID: CVE-2012-2322)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.


Remediation

Install update from vendor's website.