ID

VAR-202201-0522


CVE

CVE-2022-23098


TITLE

Connman  Infinite loop vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2022-004291

DESCRIPTION

An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received. Connman Exists in an infinite loop vulnerability.Service operation interruption (DoS) It may be in a state. For the stable distribution (bullseye), these problems have been fixed in version 1.36-2.2+deb11u1. We recommend that you upgrade your connman packages. For the detailed security status of connman please refer to its security tracker page at: https://security-tracker.debian.org/tracker/connman Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmMl6e9fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0TRZA//QR46xvu66PMnDmLubjco12vyMnfonbCrOI+ZrgQl1OHtIB1/i1/sX/e6 YJfjJpMjIM+9tbGP6wUSPYli4ZjW7fYGipaXJYFYH/Mxq8zleLO7YeO5RGtl7isi trvOcJ0N8Og+KQZHymgxI9zSiAA1cA7VjWtdZjj7izt7fm2VN/xO7Yksecm053tF hBBffflPnOXL/BA75kQ6zK+l4GJKCoqE67zWqirpoFOIzbvQsOInfkG4WBh3fxee dzSjLJ5UjmEkiJC9la9y6TnO64b1nvNkp1akGbqVHmxQrrxcS5QoWvAa4K3mNVI8 l7+lTLxqsodLv6io71pI6UQbvLiyeOBKBycGxbFvnX38GiuO2qjNGrrKUfi77Lj3 23zwbKPiOl3bcBoH6/zhJmJsCR6rREN0uhULnEDMiiEQNVqbTw2RekFSNnSiprhC CvUhaioqcNQ0Km7Uhd23kIdpBcM5lZh3hwSXWuGxpEXyyBAzorn+1rh5l/Zu0x8I OpAbtgG4EaiB4crHBnDE8Tc2ZW/VmilnJF/syrVxL8zx78ZulK+fNmTwNWTV+wRz A5xHsvmR1D0FpBr2uKQ0bq6uDWxajd5kNOmboNnha3UL+EftjgIEW3f3Y4fgHeWx 1io1lrYjacfCEm3uf+NnAjACpwnQzWh41EIJpIDBhI09KB+LDeQ= =qzlf -----END PGP SIGNATURE----- . ========================================================================== Ubuntu Security Notice USN-6236-1 July 19, 2023 connman vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 23.04 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS (Available with Ubuntu Pro) - Ubuntu 16.04 LTS (Available with Ubuntu Pro) Summary: Several security issues were fixed in ConnMan. Software Description: - connman: Intel Connection Manager daemon Details: It was discovered that ConnMan could be made to write out of bounds. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2021-26675, CVE-2021-33833) It was discovered that ConnMan could be made to leak sensitive information via the gdhcp component. A remote attacker could possibly use this issue to obtain information for further exploitation. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676) It was discovered that ConnMan could be made to read out of bounds. A remote attacker could possibly use this issue to case ConnMan to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23096, CVE-2022-23097) It was discovered that ConnMan could be made to run into an infinite loop. A remote attacker could possibly use this issue to cause ConnMan to consume resources and to stop operating, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098) It was discovered that ConnMan could be made to write out of bounds via the gweb component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292) It was discovered that ConnMan did not properly manage memory under certain circumstances. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293) It was discovered that ConnMan could be made to write out of bounds via the gdhcp component. A remote attacker could possibly use this issue to cause ConnMan to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2023-28488) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 23.04: connman 1.41-2ubuntu0.23.04.1 Ubuntu 22.04 LTS: connman 1.36-2.3ubuntu0.1 Ubuntu 20.04 LTS: connman 1.36-2ubuntu0.1 Ubuntu 18.04 LTS (Available with Ubuntu Pro): connman 1.35-6ubuntu0.1~esm1 Ubuntu 16.04 LTS (Available with Ubuntu Pro): connman 1.21-1.2+deb8u1ubuntu0.1~esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-6236-1 CVE-2021-26675, CVE-2021-26676, CVE-2021-33833, CVE-2022-23096, CVE-2022-23097, CVE-2022-23098, CVE-2022-32292, CVE-2022-32293, CVE-2023-28488 Package Information: https://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1 https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1 https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1 . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202310-21 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: ConnMan: Multiple Vulnerabilities Date: October 31, 2023 Bugs: #832028, #863425 ID: 202310-21 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in ConnMan, the worst of which can lead to remote code execution. Background ========= ConnMan provides a daemon for managing Internet connections. Affected packages ================ Package Vulnerable Unaffected ---------------- ------------------ ------------------- net-misc/connman < 1.42_pre20220801 >= 1.42_pre20220801 Description ========== Multiple vulnerabilities have been discovered in ConnMan. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All ConnMan users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/connman-1.42_pre20220801" References ========= [ 1 ] CVE-2022-23096 https://nvd.nist.gov/vuln/detail/CVE-2022-23096 [ 2 ] CVE-2022-23097 https://nvd.nist.gov/vuln/detail/CVE-2022-23097 [ 3 ] CVE-2022-23098 https://nvd.nist.gov/vuln/detail/CVE-2022-23098 [ 4 ] CVE-2022-32292 https://nvd.nist.gov/vuln/detail/CVE-2022-32292 [ 5 ] CVE-2022-32293 https://nvd.nist.gov/vuln/detail/CVE-2022-32293 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202310-21 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 2.07

sources: NVD: CVE-2022-23098 // JVNDB: JVNDB-2022-004291 // VULHUB: VHN-411975 // VULMON: CVE-2022-23098 // PACKETSTORM: 169386 // PACKETSTORM: 173601 // PACKETSTORM: 175441

AFFECTED PRODUCTS

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:intelmodel:connmanscope:lteversion:1.40

Trust: 1.0

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

vendor:connmanmodel:connmanscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-004291 // NVD: CVE-2022-23098

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-23098
value: HIGH

Trust: 1.0

NVD: CVE-2022-23098
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202201-2597
value: HIGH

Trust: 0.6

VULHUB: VHN-411975
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-23098
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-23098
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-411975
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-23098
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2022-23098
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-411975 // VULMON: CVE-2022-23098 // JVNDB: JVNDB-2022-004291 // CNNVD: CNNVD-202201-2597 // NVD: CVE-2022-23098

PROBLEMTYPE DATA

problemtype:CWE-835

Trust: 1.1

problemtype:infinite loop (CWE-835) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-411975 // JVNDB: JVNDB-2022-004291 // NVD: CVE-2022-23098

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 173601 // PACKETSTORM: 175441 // CNNVD: CNNVD-202201-2597

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202201-2597

PATCH

title:[SECURITY] [DLA 2915-1] connman security update Debian Security Advisoryurl:https://git.kernel.org/pub/scm/network/connman/connman.git/log/

Trust: 0.8

title:Connman Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=180421

Trust: 0.6

title:Debian CVElist Bug Report Logs: connman: CVE-2022-23096 CVE-2022-23097 CVE-2022-23098url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=fbf02d2c0058862b318dcda12f0708ac

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2022-23098

Trust: 0.1

title:Debian Security Advisories: DSA-5231-1 connman -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=a35ea7e493a595256b90605cc6e8cb63

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: VULMON: CVE-2022-23098 // JVNDB: JVNDB-2022-004291 // CNNVD: CNNVD-202201-2597

EXTERNAL IDS

db:NVDid:CVE-2022-23098

Trust: 3.7

db:OPENWALLid:OSS-SECURITY/2022/01/25/1

Trust: 2.6

db:JVNDBid:JVNDB-2022-004291

Trust: 0.8

db:PACKETSTORMid:169386

Trust: 0.7

db:AUSCERTid:ESB-2023.4078

Trust: 0.6

db:AUSCERTid:ESB-2022.4634

Trust: 0.6

db:CNNVDid:CNNVD-202201-2597

Trust: 0.6

db:VULHUBid:VHN-411975

Trust: 0.1

db:VULMONid:CVE-2022-23098

Trust: 0.1

db:PACKETSTORMid:173601

Trust: 0.1

db:PACKETSTORMid:175441

Trust: 0.1

sources: VULHUB: VHN-411975 // VULMON: CVE-2022-23098 // JVNDB: JVNDB-2022-004291 // PACKETSTORM: 169386 // PACKETSTORM: 173601 // PACKETSTORM: 175441 // CNNVD: CNNVD-202201-2597 // NVD: CVE-2022-23098

REFERENCES

url:https://www.openwall.com/lists/oss-security/2022/01/25/1

Trust: 2.6

url:https://www.debian.org/security/2022/dsa-5231

Trust: 1.9

url:https://git.kernel.org/pub/scm/network/connman/connman.git/log/

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2022/02/msg00009.html

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-23098

Trust: 1.7

url:https://security.gentoo.org/glsa/202310-21

Trust: 1.2

url:https://packetstormsecurity.com/files/169386/debian-security-advisory-5231-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.4078

Trust: 0.6

url:https://vigilance.fr/vulnerability/connman-three-vulnerabilities-37503

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4634

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-23097

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-32292

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-32293

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-23096

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/835.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004935

Trust: 0.1

url:https://github.com/alphabugx/cve-2022-23305

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/connman

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-28488

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26676

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-26675

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-6236-1

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: VULHUB: VHN-411975 // VULMON: CVE-2022-23098 // JVNDB: JVNDB-2022-004291 // PACKETSTORM: 169386 // PACKETSTORM: 173601 // PACKETSTORM: 175441 // CNNVD: CNNVD-202201-2597 // NVD: CVE-2022-23098

CREDITS

Debian

Trust: 0.1

sources: PACKETSTORM: 169386

SOURCES

db:VULHUBid:VHN-411975
db:VULMONid:CVE-2022-23098
db:JVNDBid:JVNDB-2022-004291
db:PACKETSTORMid:169386
db:PACKETSTORMid:173601
db:PACKETSTORMid:175441
db:CNNVDid:CNNVD-202201-2597
db:NVDid:CVE-2022-23098

LAST UPDATE DATE

2024-11-23T20:45:22.329000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-411975date:2022-09-29T00:00:00
db:VULMONid:CVE-2022-23098date:2023-12-21T00:00:00
db:JVNDBid:JVNDB-2022-004291date:2023-04-04T07:26:00
db:CNNVDid:CNNVD-202201-2597date:2023-07-20T00:00:00
db:NVDid:CVE-2022-23098date:2024-11-21T06:47:59.270

SOURCES RELEASE DATE

db:VULHUBid:VHN-411975date:2022-01-28T00:00:00
db:VULMONid:CVE-2022-23098date:2022-01-28T00:00:00
db:JVNDBid:JVNDB-2022-004291date:2023-04-04T00:00:00
db:PACKETSTORMid:169386date:2022-09-28T19:12:00
db:PACKETSTORMid:173601date:2023-07-19T15:26:27
db:PACKETSTORMid:175441date:2023-10-31T13:14:45
db:CNNVDid:CNNVD-202201-2597date:2022-01-28T00:00:00
db:NVDid:CVE-2022-23098date:2022-01-28T16:15:07.990