Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
References
Configurations
History
No history.
Information
Published : 2017-08-29 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-12865
Mitre link : CVE-2017-12865
CVE.ORG link : CVE-2017-12865
JSON object : View
Products Affected
intel
- connman
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer