ID

VAR-201708-1104


CVE

CVE-2017-12865


TITLE

ConnMan Buffer error vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2017-007631 // CNNVD: CNNVD-201708-622

DESCRIPTION

Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable. ConnMan Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. connman is prone to a stack-based buffer overflow vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. connman 1.34 and prior are vulnerable. ConnMan is a tool for network management on Tizen systems. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3956-1 security@debian.org https://www.debian.org/security/ Luciano Bello August 27, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : connman CVE ID : CVE-2017-12865 Debian Bug : 872844 Security consultants in NRI Secure Technologies discovered a stack overflow vulnerability in ConnMan, a network manager for embedded devices. For the oldstable distribution (jessie), this problem has been fixed in version 1.21-1.2+deb8u1. For the stable distribution (stretch), this problem has been fixed in version 1.33-3+deb9u1. For the testing distribution (buster), this problem has been fixed in version 1.33-3+deb9u1. For the unstable distribution (sid), this problem has been fixed in version 1.35-1. We recommend that you upgrade your connman packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEayzFlnvRveqeWJspbsLe9o/+N3QFAlmjRVgACgkQbsLe9o/+ N3T3/Q//VQRbz2KIvb/nJA79D9HsmJiV5MCs8odlsPfV+796eENsgepO3elsdm75 vo5FHTORoN+tc2cw9zOkpgR/tTNYVFq/adcchecjW6E8Ruh57AwT1PaDDStaTger ra9tk3QBVOWBkhdZmag8RxNt99EK9o1pVn0zu2cdNWwWR+0DJFLOTn+icvaX9a00 E53GXX/CCMEYw0Smo3t3D0HuR6NLLDFbyV1Cf/fte29Hdt7Ni0aXUZsjyqlND7LI mF1m4OcouoGhS/QFBEkIsduMs07Merc7ZHQ93z/RMtqQzo9Ev/7qBsgGG7TokTif m+HmH6x6OJ+QIVca2VK7i3pKmWu+zLtF5zixG/U0ED5nVoeDE1vnHmLlQilHOzi/ Dxmb6gPNQvbLYE3Hr2ytgL4ICmADVeUlpVfEc4km17G8fiTCaCY5vAlKRUy209bE d9izLn1u3J2i1gb3IsJ1qxfIG3kxy6xnXXED0sGZXCp61HU2SaXTiK76B5MLiBHP wQN335oSsRIbORSsCvfcqVUAtLs9BLqV3fQ57wb7nM5qH7vfHndcGXc/lVNb6eJe 3PjOIyDUU58K987FnvbN+FSWGuv5cfbsQLZwfICU5s95r2EAoS06tk2/iGU76Wwy zjmu3on4C2men6TxIaWCOamkBR+igB9MvRIRD2wRIUkg5mudmf8= =p3fr -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201812-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: ConnMan: Multiple vulnerabilities Date: December 02, 2018 Bugs: #628566, #630028 ID: 201812-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in ConnMan, the worst of which could result in the remote execution of code. Background ========== ConnMan provides a daemon for managing Internet connections. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/connman < 1.35-r1 >= 1.35-r1 Description =========== Multiple vulnerabilities have been discovered in ConnMan. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All ConnMan users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/connman-1.35-r1" References ========== [ 1 ] CVE-2017-12865 https://nvd.nist.gov/vuln/detail/CVE-2017-12865 [ 2 ] CVE-2017-5716 https://nvd.nist.gov/vuln/detail/CVE-2017-5716 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201812-02 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2018 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 2.16

sources: NVD: CVE-2017-12865 // JVNDB: JVNDB-2017-007631 // BID: 100498 // VULHUB: VHN-103430 // PACKETSTORM: 143931 // PACKETSTORM: 150558

AFFECTED PRODUCTS

vendor:intelmodel:connmanscope:lteversion:1.34

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:connmanmodel:connmanscope:eqversion:1.34

Trust: 0.9

vendor:connmanmodel:connmanscope:lteversion:1.34

Trust: 0.8

vendor:debianmodel:gnu/linuxscope:eqversion:8.0

Trust: 0.8

vendor:connmanmodel:connmanscope:eqversion:1.33

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:1.32

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:1.31

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:1.30

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:1.3

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:1.20

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:1.10

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:1.0

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.90

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.80

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.70

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.60

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.50

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.40

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.30

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.20

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.10

Trust: 0.3

vendor:connmanmodel:connmanscope:eqversion:0.1

Trust: 0.3

vendor:connmanmodel:connmanscope:neversion:1.35

Trust: 0.3

sources: BID: 100498 // JVNDB: JVNDB-2017-007631 // CNNVD: CNNVD-201708-622 // NVD: CVE-2017-12865

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12865
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-12865
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201708-622
value: CRITICAL

Trust: 0.6

VULHUB: VHN-103430
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-12865
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-103430
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12865
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2017-12865
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-103430 // JVNDB: JVNDB-2017-007631 // CNNVD: CNNVD-201708-622 // NVD: CVE-2017-12865

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-103430 // JVNDB: JVNDB-2017-007631 // NVD: CVE-2017-12865

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 150558 // CNNVD: CNNVD-201708-622

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201708-622

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007631

PATCH

title:ConnMan Project Connection Manager Daemon Buffer Overflowurl:https://01.org/security/advisories/intel-oss-10001

Trust: 0.8

title:DSA-3956url:https://www.debian.org/security/2017/dsa-3956

Trust: 0.8

title:dnsproxy: Fix crash on malformed DNS responseurl:https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71

Trust: 0.8

title:ConnMan Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111156

Trust: 0.6

sources: JVNDB: JVNDB-2017-007631 // CNNVD: CNNVD-201708-622

EXTERNAL IDS

db:NVDid:CVE-2017-12865

Trust: 3.0

db:BIDid:100498

Trust: 2.0

db:JVNDBid:JVNDB-2017-007631

Trust: 0.8

db:CNNVDid:CNNVD-201708-622

Trust: 0.7

db:PACKETSTORMid:150558

Trust: 0.2

db:PACKETSTORMid:143931

Trust: 0.2

db:VULHUBid:VHN-103430

Trust: 0.1

sources: VULHUB: VHN-103430 // BID: 100498 // JVNDB: JVNDB-2017-007631 // PACKETSTORM: 143931 // PACKETSTORM: 150558 // CNNVD: CNNVD-201708-622 // NVD: CVE-2017-12865

REFERENCES

url:https://bugzilla.redhat.com/show_bug.cgi?id=1483720

Trust: 2.0

url:https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=5c281d182ecdd0a424b64f7698f32467f8f67b71

Trust: 2.0

url:https://security.gentoo.org/glsa/201812-02

Trust: 1.8

url:http://www.securityfocus.com/bid/100498

Trust: 1.7

url:https://01.org/security/intel-oss-10001/intel-oss-10001

Trust: 1.7

url:http://www.debian.org/security/2017/dsa-3956

Trust: 1.7

url:https://www.nri-secure.com/blog/new-iot-vulnerability-connmando

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-12865

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12865

Trust: 0.8

url:http://connman.net/

Trust: 0.3

url:https://git.kernel.org/pub/scm/network/connman/connman.git/commit/?id=ebc8fda495ce285505b77e70c5b3fd45dfd3ab63

Trust: 0.3

url:https://www.debian.org/security/

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5716

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: VULHUB: VHN-103430 // BID: 100498 // JVNDB: JVNDB-2017-007631 // PACKETSTORM: 143931 // PACKETSTORM: 150558 // CNNVD: CNNVD-201708-622 // NVD: CVE-2017-12865

CREDITS

Pedro Sampaio

Trust: 0.3

sources: BID: 100498

SOURCES

db:VULHUBid:VHN-103430
db:BIDid:100498
db:JVNDBid:JVNDB-2017-007631
db:PACKETSTORMid:143931
db:PACKETSTORMid:150558
db:CNNVDid:CNNVD-201708-622
db:NVDid:CVE-2017-12865

LAST UPDATE DATE

2025-04-20T23:19:52.724000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-103430date:2020-03-05T00:00:00
db:BIDid:100498date:2017-08-21T00:00:00
db:JVNDBid:JVNDB-2017-007631date:2017-09-27T00:00:00
db:CNNVDid:CNNVD-201708-622date:2020-03-06T00:00:00
db:NVDid:CVE-2017-12865date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-103430date:2017-08-29T00:00:00
db:BIDid:100498date:2017-08-21T00:00:00
db:JVNDBid:JVNDB-2017-007631date:2017-09-27T00:00:00
db:PACKETSTORMid:143931date:2017-08-28T23:23:00
db:PACKETSTORMid:150558date:2018-12-03T21:05:54
db:CNNVDid:CNNVD-201708-622date:2017-08-16T00:00:00
db:NVDid:CVE-2017-12865date:2017-08-29T16:29:00.217