Buffer Overflow Vulnerability in ConnMan from Vendor Impacting Network Services
CVE-2023-28488
6.5MEDIUM
Summary
The vulnerability in ConnMan's client.c file allows network-adjacent attackers operating a malicious DHCP server to exploit a stack-based buffer overflow. This exploitation can lead to a denial of service by terminating the ConnMan process, disrupting network services for connected devices. The issue affects versions of ConnMan prior to 1.41, highlighting the importance of keeping network service software updated and properly configured to mitigate potential attacks.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved