Affected configuration(s):


Date published: 2017-08-29T12:29:00.217-04:00

Date last modified: 2017-09-06T21:29:03.963-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL:

Summary: Stack-based buffer overflow in “dnsproxy.c” in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the “name” variable.


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.