CVE-2023-28488
Summary
| CVE | CVE-2023-28488 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-04-12 16:15:00 UTC |
| Updated | 2023-05-31 04:15:00 UTC |
| Description | client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| poc_exploits/CVE-2023-28488 at master · moehw/poc_exploits · GitHub | MISC | github.com | Exploit, Patch, Third Party Advisory |
| Debian -- Security Information -- DSA-5416-1 connman | DEBIAN | www.debian.org | |
| [SECURITY] [DLA 3397-1] connman security update | MLIST | lists.debian.org | |
| 99e2c16ea1cced34a5dc450d76287a1c3e762138 - pub/scm/network/connman/connman - Git at Google | MISC | kernel.googlesource.com | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.