CVE-2023-28488
CVSS V2 None
CVSS V3 None
Description
client.c in gdhcp in ConnMan through 1.41 could be used by network-adjacent attackers (operating a crafted DHCP server) to cause a stack-based buffer overflow and denial of service, terminating the connman process.
Overview
- CVE ID
- CVE-2023-28488
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2023-04-12T16:15:19
- Last Modified Date
- 2023-04-21T19:15:07
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:intel:connman:*:*:*:*:*:*:*:* | 1 | OR | 0.55 | 1.41 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/moehw/poc_exploits/tree/master/CVE-2023-28488 | Exploit Patch Third Party Advisory |
https://kernel.googlesource.com/pub/scm/network/connman/connman/+/99e2c16ea1cced34a5dc450d76287a1c3e762138 | Patch |
https://lists.debian.org/debian-lts-announce/2023/04/msg00024.html |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28488 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28488 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 04:36:39 | Added to TrackCVE | |||
2023-04-18 13:00:46 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-04-19 21:01:04 | 2023-04-19T20:01:26 | CVE Modified Date | updated | |
2023-04-19 21:01:04 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-04-19 21:01:05 | Weakness Enumeration | new | ||
2023-04-19 21:01:06 | CPE Information | updated | ||
2023-04-21 20:00:42 | 2023-04-21T19:15:07 | CVE Modified Date | updated | |
2023-04-21 20:00:42 | Analyzed | Modified | Vulnerability Status | updated |
2023-04-21 20:00:46 | References | updated |