The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
Max CVSS
10.0
EPSS Score
1.22%
Published
2012-05-18
Updated
2017-08-29
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
Max CVSS
7.8
EPSS Score
8.37%
Published
2012-05-18
Updated
2017-08-29
Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.
Max CVSS
5.0
EPSS Score
4.92%
Published
2012-05-18
Updated
2017-08-29
3 vulnerabilities found