client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.
References
Configurations
History
21 Nov 2024, 07:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488 - Exploit, Patch, Third Party Advisory | |
References | () https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138 - Patch | |
References | () https://lists.debian.org/debian-lts-announce/2023/04/msg00024.html - | |
References | () https://www.debian.org/security/2023/dsa-5416 - |
31 May 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-04-12 16:15
Updated : 2024-11-21 07:55
NVD link : CVE-2023-28488
Mitre link : CVE-2023-28488
CVE.ORG link : CVE-2023-28488
JSON object : View
Products Affected
intel
- connman
CWE
CWE-787
Out-of-bounds Write