SB2012051507 - Gentoo update for ConnMan



SB2012051507 - Gentoo update for ConnMan

Published: May 15, 2012 Updated: September 25, 2016

Security Bulletin ID SB2012051507
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-2320)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.


2) Input validation error (CVE-ID: CVE-2012-2321)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.


3) Input validation error (CVE-ID: CVE-2012-2322)

The vulnerability allows a remote non-authenticated attacker to perform service disruption.

Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.


Remediation

Install update from vendor's website.