CVE-2022-23096

Severity
9.1CRITICAL
EPSS
0.1%
top 76.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 28
Latest updateJul 19

Description

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:HExploitability: 3.9 | Impact: 5.2

Affected Packages2 packages

โ–ถDebianconnman< 1.36-2.2+deb11u1+3
โ–ถNVDintel/connman1.40

Also affects: Debian Linux 11.0, 9.0

๐Ÿ”ดVulnerability Details

3
GHSA
GHSA-h9cr-qjg3-wh75: An issue was discovered in the DNS proxy in Connman through 1โ†—2022-02-10
โ–ถ
CVEList
CVE-2022-23096: An issue was discovered in the DNS proxy in Connman through 1โ†—2022-01-28
โ–ถ
OSV
CVE-2022-23096: An issue was discovered in the DNS proxy in Connman through 1โ†—2022-01-28
โ–ถ

๐Ÿ“‹Vendor Advisories

2
Ubuntu
ConnMan vulnerabilitiesโ†—2023-07-19
โ–ถ
Debian
CVE-2022-23096: connman - An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server...โ†—2022
โ–ถ