Date published: 2017-08-29T12:29:00.217-04:00
Date last modified: 2017-09-06T21:29:03.963-04:00
CVSS Score: 7.5
Principal attack vector: NETWORK
Reference URL: http://www.debian.org/security/2017/dsa-3956
Summary: Stack-based buffer overflow in “dnsproxy.c” in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the “name” variable.