CVE-2017-12865CVE-2017-12865

Affected configuration(s):

cpe:/a:connman_project:connman:1.34
cpe:/o:debian:debian_linux:8.0

Date published: 2017-08-29T12:29:00.217-04:00

Date last modified: 2017-09-06T21:29:03.963-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://www.debian.org/security/2017/dsa-3956

Summary: Stack-based buffer overflow in “dnsproxy.c” in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the “name” variable.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.