ID |
CVE-2021-33833
|
Summary |
ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based buffer overflow in uncompress in dnsproxy.c via NAME, RDATA, or RDLENGTH (for A or AAAA). |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:intel:connection_manager:1.30:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.30:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.31:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.31:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.32:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.32:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.33:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.33:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.34:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.34:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.35:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.35:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.36:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.36:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.37:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.37:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.38:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.38:*:*:*:*:*:*:*
-
cpe:2.3:a:intel:connection_manager:1.39:*:*:*:*:*:*:*
cpe:2.3:a:intel:connection_manager:1.39:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 7.5 (as of 09-02-2022 - 21:20) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-787 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
Last major update |
09-02-2022 - 21:20 |
Published |
09-06-2021 - 18:15 |
Last modified |
09-02-2022 - 21:20 |