ID

VAR-202201-0428


CVE

CVE-2022-23097


TITLE

Connman  Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-004292

DESCRIPTION

An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read. Connman Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Connman is a connection manager. A security vulnerability exists in Connman's DNS proxy due to forward_dns_reply mishandling strnlen calls, resulting in an out-of-bounds read. No detailed vulnerability details were provided at this time. For the stable distribution (bullseye), these problems have been fixed in version 1.36-2.2+deb11u1. We recommend that you upgrade your connman packages. For the detailed security status of connman please refer to its security tracker page at: https://security-tracker.debian.org/tracker/connman Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmMl6e9fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TRZA//QR46xvu66PMnDmLubjco12vyMnfonbCrOI+ZrgQl1OHtIB1/i1/sX/e6 YJfjJpMjIM+9tbGP6wUSPYli4ZjW7fYGipaXJYFYH/Mxq8zleLO7YeO5RGtl7isi trvOcJ0N8Og+KQZHymgxI9zSiAA1cA7VjWtdZjj7izt7fm2VN/xO7Yksecm053tF hBBffflPnOXL/BA75kQ6zK+l4GJKCoqE67zWqirpoFOIzbvQsOInfkG4WBh3fxee dzSjLJ5UjmEkiJC9la9y6TnO64b1nvNkp1akGbqVHmxQrrxcS5QoWvAa4K3mNVI8 l7+lTLxqsodLv6io71pI6UQbvLiyeOBKBycGxbFvnX38GiuO2qjNGrrKUfi77Lj3 23zwbKPiOl3bcBoH6/zhJmJsCR6rREN0uhULnEDMiiEQNVqbTw2RekFSNnSiprhC CvUhaioqcNQ0Km7Uhd23kIdpBcM5lZh3hwSXWuGxpEXyyBAzorn+1rh5l/Zu0x8I OpAbtgG4EaiB4crHBnDE8Tc2ZW/VmilnJF/syrVxL8zx78ZulK+fNmTwNWTV+wRz A5xHsvmR1D0FpBr2uKQ0bq6uDWxajd5kNOmboNnha3UL+EftjgIEW3f3Y4fgHeWx 1io1lrYjacfCEm3uf+NnAjACpwnQzWh41EIJpIDBhI09KB+LDeQ= =qzlf -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6236-1 July 19, 2023 connman vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.04 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in ConnMan. Software Description: - connman: Intel Connection Manager daemon Details: It was discovered that ConnMan could be made to write out of bounds. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-26675, CVE-2021-33833) It was discovered that ConnMan could be made to leak sensitive information via the gdhcp component. A remote attacker could possibly use this issue to obtain information for further exploitation. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676) It was discovered that ConnMan could be made to read out of bounds. A remote attacker could possibly use this issue to case ConnMan to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23096, CVE-2022-23097) It was discovered that ConnMan could be made to run into an infinite loop. A remote attacker could possibly use this issue to cause ConnMan to consume resources and to stop operating, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098) It was discovered that ConnMan could be made to write out of bounds via the gweb component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292) It was discovered that ConnMan did not properly manage memory under certain circumstances. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293) It was discovered that ConnMan could be made to write out of bounds via the gdhcp component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-28488) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04: connman 1.41-2ubuntu0.23.04.1 Ubuntu 22.04 LTS: connman 1.36-2.3ubuntu0.1 Ubuntu 20.04 LTS: connman 1.36-2ubuntu0.1 Ubuntu 18.04 LTS (Available with Ubuntu Pro): connman 1.35-6ubuntu0.1~esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): connman 1.21-1.2+deb8u1ubuntu0.1~esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6236-1 CVE-2021-26675, CVE-2021-26676, CVE-2021-33833, CVE-2022-23096, CVE-2022-23097, CVE-2022-23098, CVE-2022-32292, CVE-2022-32293, CVE-2023-28488 Package Information: https://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1 https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1 https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1 . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202310-21 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: ConnMan: Multiple Vulnerabilities Date: October 31, 2023 Bugs: #832028, #863425 ID: 202310-21 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in ConnMan, the worst of which can lead to remote code execution. Background ========= ConnMan provides a daemon for managing Internet connections. Affected packages ================ Package Vulnerable Unaffected ---------------- ------------------ ------------------- net-misc/connman < 1.42_pre20220801 >= 1.42_pre20220801 Description ========== Multiple vulnerabilities have been discovered in ConnMan. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All ConnMan users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/connman-1.42_pre20220801" References ========= [ 1 ] CVE-2022-23096 https://nvd.nist.gov/vuln/detail/CVE-2022-23096 [ 2 ] CVE-2022-23097 https://nvd.nist.gov/vuln/detail/CVE-2022-23097 [ 3 ] CVE-2022-23098 https://nvd.nist.gov/vuln/detail/CVE-2022-23098 [ 4 ] CVE-2022-32292 https://nvd.nist.gov/vuln/detail/CVE-2022-32292 [ 5 ] CVE-2022-32293 https://nvd.nist.gov/vuln/detail/CVE-2022-32293 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202310-21 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 2.07

sources: NVD: CVE-2022-23097 // JVNDB: JVNDB-2022-004292 // VULHUB: VHN-411974 // VULMON: CVE-2022-23097 // PACKETSTORM: 169386 // PACKETSTORM: 173601 // PACKETSTORM: 175441

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:intelmodel:connmanscope:lteversion:1.40

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:connmanmodel:connmanscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-004292 // NVD: CVE-2022-23097

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-23097
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-23097
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202201-2596
value: CRITICAL

Trust: 0.6

VULHUB: VHN-411974
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-23097
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-23097
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-411974
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-23097
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2022-23097
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-411974 // VULMON: CVE-2022-23097 // JVNDB: JVNDB-2022-004292 // CNNVD: CNNVD-202201-2596 // NVD: CVE-2022-23097

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:Out-of-bounds read (CWE-125) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-411974 // JVNDB: JVNDB-2022-004292 // NVD: CVE-2022-23097

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 173601 // PACKETSTORM: 175441 // CNNVD: CNNVD-202201-2596

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202201-2596

PATCH

title:[SECURITY] [DLA 2915-1] connman security update Debian Security Advisoryurl:https://git.kernel.org/pub/scm/network/connman/connman.git/log/

Trust: 0.8

title:Connman Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=180420

Trust: 0.6

title:Debian CVElist Bug Report Logs: connman: CVE-2022-23096 CVE-2022-23097 CVE-2022-23098url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=fbf02d2c0058862b318dcda12f0708ac

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2022-23097

Trust: 0.1

title:Debian Security Advisories: DSA-5231-1 connman -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=a35ea7e493a595256b90605cc6e8cb63

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: VULMON: CVE-2022-23097 // JVNDB: JVNDB-2022-004292 // CNNVD: CNNVD-202201-2596

EXTERNAL IDS

db:NVDid:CVE-2022-23097

Trust: 3.7

db:OPENWALLid:OSS-SECURITY/2022/01/25/1

Trust: 2.6

db:JVNDBid:JVNDB-2022-004292

Trust: 0.8

db:PACKETSTORMid:169386

Trust: 0.7

db:AUSCERTid:ESB-2023.4078

Trust: 0.6

db:AUSCERTid:ESB-2022.4634

Trust: 0.6

db:CNNVDid:CNNVD-202201-2596

Trust: 0.6

db:CNVDid:CNVD-2022-09131

Trust: 0.1

db:VULHUBid:VHN-411974

Trust: 0.1

db:VULMONid:CVE-2022-23097

Trust: 0.1

db:PACKETSTORMid:173601

Trust: 0.1

db:PACKETSTORMid:175441

Trust: 0.1

sources: VULHUB: VHN-411974 // VULMON: CVE-2022-23097 // JVNDB: JVNDB-2022-004292 // PACKETSTORM: 169386 // PACKETSTORM: 173601 // PACKETSTORM: 175441 // CNNVD: CNNVD-202201-2596 // NVD: CVE-2022-23097

REFERENCES

url:https://www.openwall.com/lists/oss-security/2022/01/25/1

Trust: 2.6

url:https://www.debian.org/security/2022/dsa-5231

Trust: 1.9

url:https://git.kernel.org/pub/scm/network/connman/connman.git/log/

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-23097

Trust: 1.7

url:https://security.gentoo.org/glsa/202310-21

Trust: 1.2

url:https://packetstormsecurity.com/files/169386/debian-security-advisory-5231-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.4078

Trust: 0.6

url:https://vigilance.fr/vulnerability/connman-three-vulnerabilities-37503

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4634

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-32292

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-23098

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-32293

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-23096

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004935

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/connman

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-28488

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26676

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26675

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6236-1

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: VULHUB: VHN-411974 // VULMON: CVE-2022-23097 // JVNDB: JVNDB-2022-004292 // PACKETSTORM: 169386 // PACKETSTORM: 173601 // PACKETSTORM: 175441 // CNNVD: CNNVD-202201-2596 // NVD: CVE-2022-23097

CREDITS

Debian

Trust: 0.1

sources: PACKETSTORM: 169386

SOURCES

db:VULHUBid:VHN-411974
db:VULMONid:CVE-2022-23097
db:JVNDBid:JVNDB-2022-004292
db:PACKETSTORMid:169386
db:PACKETSTORMid:173601
db:PACKETSTORMid:175441
db:CNNVDid:CNNVD-202201-2596
db:NVDid:CVE-2022-23097

LAST UPDATE DATE

2024-11-23T20:11:14.915000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-411974date:2022-09-29T00:00:00
db:VULMONid:CVE-2022-23097date:2023-12-21T00:00:00
db:JVNDBid:JVNDB-2022-004292date:2023-04-04T07:38:00
db:CNNVDid:CNNVD-202201-2596date:2023-07-20T00:00:00
db:NVDid:CVE-2022-23097date:2024-11-21T06:47:59.120

SOURCES RELEASE DATE

db:VULHUBid:VHN-411974date:2022-01-28T00:00:00
db:VULMONid:CVE-2022-23097date:2022-01-28T00:00:00
db:JVNDBid:JVNDB-2022-004292date:2023-04-04T00:00:00
db:PACKETSTORMid:169386date:2022-09-28T19:12:00
db:PACKETSTORMid:173601date:2023-07-19T15:26:27
db:PACKETSTORMid:175441date:2023-10-31T13:14:45
db:CNNVDid:CNNVD-202201-2596date:2022-01-28T00:00:00
db:NVDid:CVE-2022-23097date:2022-01-28T16:15:07.943