#VU50670 Stack-based buffer overflow in ConnMan - CVE-2021-26675

 

#VU50670 Stack-based buffer overflow in ConnMan - CVE-2021-26675

Published: February 12, 2021


Vulnerability identifier: #VU50670
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2021-26675
CWE-ID: CWE-121
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
ConnMan
Software vendor:
kernel.org

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within dnsproxy in ConnMan. A remote unauthenticated attacker on the local network can send specially crafted packets to the affected system, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links