The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
Max CVSS
10.0
EPSS Score
1.22%
Published
2012-05-18
Updated
2017-08-29
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
Max CVSS
7.8
EPSS Score
8.37%
Published
2012-05-18
Updated
2017-08-29
2 vulnerabilities found