CVE-2017-12865
Severity
9.8CRITICAL
EPSS
3.8%
top 11.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 29
Latest updateMay 13
Description
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages2 packages
Also affects: Debian Linux 8.0
Patches
🔴Vulnerability Details
3📋Vendor Advisories
1Debian▶
CVE-2017-12865: connman - Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows r...↗2017
💬Community
3Bugzilla▶
CVE-2017-12865 connman: Stack-based buffer overflow in parse_response function in src/dnsproxy.c↗2017-08-21
Bugzilla▶
CVE-2017-12865 connman: Stack-based buffer overflow in parse_response function in src/dnsproxy.c [fedora-all]↗2017-08-21
Bugzilla▶
CVE-2017-12865 connman: Stack-based buffer overflow in parse_response function in src/dnsproxy.c [epel-7]↗2017-08-21