CVE-2017-12865

CWE-119Buffer Overflow8 documents6 sources
Severity
9.8CRITICAL
EPSS
3.8%
top 11.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 29
Latest updateMay 13

Description

Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Debianconnman< 1.35-1+3
NVDintel/connman1.34

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-2f42-jv77-x675: Stack-based buffer overflow in "dnsproxy2022-05-13
CVEList
CVE-2017-12865: Stack-based buffer overflow in "dnsproxy2017-08-29
OSV
CVE-2017-12865: Stack-based buffer overflow in "dnsproxy2017-08-29

📋Vendor Advisories

1
Debian
CVE-2017-12865: connman - Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows r...2017

💬Community

3
Bugzilla
CVE-2017-12865 connman: Stack-based buffer overflow in parse_response function in src/dnsproxy.c2017-08-21
Bugzilla
CVE-2017-12865 connman: Stack-based buffer overflow in parse_response function in src/dnsproxy.c [fedora-all]2017-08-21
Bugzilla
CVE-2017-12865 connman: Stack-based buffer overflow in parse_response function in src/dnsproxy.c [epel-7]2017-08-21