SB2012051507 - Gentoo update for ConnMan
Published: May 15, 2012 Updated: September 25, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-2320)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
2) Input validation error (CVE-ID: CVE-2012-2321)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The loopback plug-in in ConnMan before 0.85 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) host name or (2) domain name in a DHCP reply.
3) Input validation error (CVE-ID: CVE-2012-2322)
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
Integer overflow in the dhcpv6_get_option function in gdhcp/client.c in ConnMan before 0.85 allows remote attackers to cause a denial of service (infinite loop and crash) via an invalid length value in a DHCP packet.
Remediation
Install update from vendor's website.