Lucene search

K
gentooGentoo FoundationGLSA-201205-02
HistoryMay 15, 2012 - 12:00 a.m.

ConnMan: Multiple vulnerabilities

2012-05-1500:00:00
Gentoo Foundation
security.gentoo.org
14

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.084 Low

EPSS

Percentile

94.4%

Background

ConnMan provides a daemon for managing Internet connections.

Description

Multiple vulnerabilities have been found in ConnMan:

  • Errors in inet.c and rtnl.c prevent ConnMan from checking the origin of netlink messages (CVE-2012-2320).
  • ConnMan does not properly check for shell escapes when requesting a hostname via DHCP (CVE-2012-2321).
  • An infinite loop error exists in client.c (CVE-2012-2322).

Impact

A remote attacker could execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All ConnMan users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-misc/connman-1.0-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-misc/connman< 1.0-r1UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.084 Low

EPSS

Percentile

94.4%