#VU50670 Stack-based buffer overflow in ConnMan - CVE-2021-26675
Published: February 12, 2021
ConnMan
kernel.org
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within dnsproxy in ConnMan. A remote unauthenticated attacker on the local network can send specially crafted packets to the affected system, trigger a stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- https://bugzilla.suse.com/show_bug.cgi?id=1181751
- https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=e4079a20f617a4b076af503f6e4e8b0304c9f2cb
- https://git.kernel.org/pub/scm/network/connman/connman.git/tree/ChangeLog
- https://lists.debian.org/debian-lts-announce/2021/02/msg00013.html
- https://www.debian.org/security/2021/dsa-4847
- https://www.openwall.com/lists/oss-security/2021/02/08/2