Lucene search

K
zdiDavid BERARD and Vincent DEHORS from @SynacktivZDI-22-1187
HistorySep 08, 2022 - 12:00 a.m.

(Pwn2Own) ConnMan received_data Out-Of-Bounds Write Remote Code Execution Vulnerability

2022-09-0800:00:00
David BERARD and Vincent DEHORS from @Synacktiv
www.zerodayinitiative.com
58
(connman)(received_data)(oob write)(remote code exec)(vulnerability)(http response)(tesla model 3)(pwn2own 2022)(vancouver)

0.021 Low

EPSS

Percentile

89.0%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installation of ConnMan. Authentication is not required to exploit this vulnerability. The specific flaw exists within the received_data method. Crafted data in a HTTP response can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the ConnMan process. This vulnerability was demonstrated on a Tesla Model 3 during Pwn2Own 2022 Vancouver competition.