SB2021021208 - Multiple vulnerabilities in ConnMan
Published: February 12, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Memory leak (CVE-ID: CVE-2021-26676)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due memory leak in gdhcp in ConnMan. A remote attacker on the local network can force the application to leak sensitive stack information.
2) Stack-based buffer overflow (CVE-ID: CVE-2021-26675)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within dnsproxy in ConnMan. A remote unauthenticated attacker on the local network can send specially crafted packets to the affected system, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.
References
- https://bugzilla.suse.com/show_bug.cgi?id=1181751
- https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=58d397ba74873384aee449690a9070bacd5676fa
- https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=a74524b3e3fad81b0fd1084ffdf9f2ea469cd9b1
- https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog
- https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html
- https://www.debian.org/security/2021/dsa-4847
- https://www.openwall.com/lists/oss-security/2021/02/08/2
- https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb