Known Vulnerabilities for Connman by Intel
Listed below are 7 of the newest known vulnerabilities associated with "Connman" by "Intel".
These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.
Data on known vulnerable versions is also displayed based on information from known CPEs
Known Vulnerabilities
| CVE | Shortened Description | Severity | Publish Date | Last Modified |
|---|---|---|---|---|
| CVE-2022-23098 | An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if... | 7.5 - HIGH | 2022-01-28 | 2023-12-21 |
| CVE-2022-23097 | An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an ... | 9.1 - CRITICAL | 2022-01-28 | 2023-12-21 |
| CVE-2022-23096 | An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the p... | 9.1 - CRITICAL | 2022-01-28 | 2023-12-21 |
| CVE-2021-26676 | gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing furthe... | 6.5 - MEDIUM | 2021-02-09 | 2022-05-06 |
| CVE-2021-26675 | A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. | 8.8 - HIGH | 2021-02-09 | 2022-05-23 |
| CVE-2017-12865 | Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service ... | 9.8 - CRITICAL | 2017-08-29 | 2020-03-05 |
| CVE-2012-6459 | ConnMan 1.3 on Tizen continues to list the bluetooth service after offline mode has been enabled, which might allow remote at... | 4.3 - MEDIUM | 2013-01-01 | 2020-03-05 |
Known Affected Configurations (CPE V2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Intel | Connman | 1.9 | All | All | All |
| Application | Intel | Connman | 1.8 | All | All | All |
| Application | Intel | Connman | 1.7 | All | All | All |
| Application | Intel | Connman | 1.6 | All | All | All |
| Application | Intel | Connman | 1.5 | All | All | All |
| Application | Intel | Connman | 1.4 | All | All | All |
| Application | Intel | Connman | 1.39 | All | All | All |
| Application | Intel | Connman | 1.38 | All | All | All |
| Application | Intel | Connman | 1.37 | All | All | All |
| Application | Intel | Connman | 1.36 | All | All | All |
| Application | Intel | Connman | 1.35 | All | All | All |
| Application | Intel | Connman | 1.34 | All | All | All |
| Application | Intel | Connman | 1.33 | All | All | All |
| Application | Intel | Connman | 1.32 | All | All | All |
| Application | Intel | Connman | 1.31 | All | All | All |
| Application | Intel | Connman | 1.30 | All | All | All |
| Application | Intel | Connman | 1.3 | All | All | All |
| Application | Intel | Connman | 1.29 | All | All | All |
| Application | Intel | Connman | 1.28 | All | All | All |
| Application | Intel | Connman | 1.27 | All | All | All |