FKIE_CVE-2012-2320

Vulnerability from fkie_nvd - Published: 2012-05-18 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message.
References
secalert@redhat.comhttp://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618
secalert@redhat.comhttp://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9
secalert@redhat.comhttp://secunia.com/advisories/49033Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/49186
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201205-02.xml
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/10
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/05/07/6
secalert@redhat.comhttp://www.osvdb.org/81704
secalert@redhat.comhttp://www.securityfocus.com/bid/53406
secalert@redhat.comhttps://bugzilla.novell.com/show_bug.cgi?id=715172
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/75465
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618
af854a3a-2127-422b-91ae-364da2661108http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49033Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49186
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201205-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/10
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/05/07/6
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/81704
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/53406
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.novell.com/show_bug.cgi?id=715172
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/75465
Impacted products
Vendor Product Version
connman connman *
connman connman 0.1
connman connman 0.2
connman connman 0.3
connman connman 0.4
connman connman 0.5
connman connman 0.6
connman connman 0.7
connman connman 0.8
connman connman 0.9
connman connman 0.10
connman connman 0.11
connman connman 0.12
connman connman 0.13
connman connman 0.14
connman connman 0.15
connman connman 0.16
connman connman 0.17
connman connman 0.18
connman connman 0.19
connman connman 0.20
connman connman 0.21
connman connman 0.22
connman connman 0.23
connman connman 0.24
connman connman 0.25
connman connman 0.26
connman connman 0.27
connman connman 0.28
connman connman 0.29
connman connman 0.30
connman connman 0.31
connman connman 0.32
connman connman 0.33
connman connman 0.34
connman connman 0.35
connman connman 0.36
connman connman 0.37
connman connman 0.38
connman connman 0.39
connman connman 0.40
connman connman 0.41
connman connman 0.42
connman connman 0.43
connman connman 0.44
connman connman 0.45
connman connman 0.46
connman connman 0.47
connman connman 0.48
connman connman 0.49
connman connman 0.50
connman connman 0.51
connman connman 0.52
connman connman 0.53
connman connman 0.54
connman connman 0.55
connman connman 0.56
connman connman 0.57
connman connman 0.58
connman connman 0.59
connman connman 0.60
connman connman 0.61
connman connman 0.62
connman connman 0.63
connman connman 0.64
connman connman 0.65
connman connman 0.66
connman connman 0.67
connman connman 0.68
connman connman 0.69
connman connman 0.70
connman connman 0.71
connman connman 0.72
connman connman 0.73
connman connman 0.74
connman connman 0.75
connman connman 0.76
connman connman 0.77
connman connman 0.78
connman connman 0.79
connman connman 0.80
connman connman 0.81
connman connman 0.82
connman connman 0.83

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:connman:connman:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C844ABC-A612-4769-B447-4CD111A394C9",
              "versionEndIncluding": "0.84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCE57DA0-84A4-428B-A1C1-7DF0ED701C8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AA5F12-8130-41DF-A08F-0EB67A68D4F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "42B47F7E-C183-47CE-B6AF-D5CF185E80DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECD8768D-B7D9-49BC-85FC-D79F00FCB40A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "139CF2DE-334B-43B9-8D36-FCDD089B510E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DB232CB-BA22-44F5-ADE9-3890DF8C7334",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7ACDD0-46DB-4F35-9D85-5867796C4415",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3912721F-C494-4C13-B23F-44B69472D128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "303234E7-A3BC-46A3-9160-FE91C0AA8A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DF474F3-B2B1-40E0-A044-69C202917C10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03C15BB-6528-4312-BF64-B32878DE552D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B2924C2-614B-46DA-BB5B-314A184C080A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C795079-AC8A-4DA7-A611-F033C2FD0FD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68D7306-E937-4C55-AAF2-AB6BF92D4D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "789193B9-7C50-4769-A890-BA2E52E0B31F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4503C736-A9E9-4D14-AC85-FBBFA5ADF248",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EBA6F66-67D6-41C9-B06A-60760435CC1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1021350C-4CE1-4979-B7EC-69D278AB5EAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE533DBB-E3E1-4C74-BACB-869D65FAF1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6BBF88-2C8C-44B2-9E71-C90397F9ADFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E4F365-44C7-46FA-87E6-4DE999E413A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71C07B5-EE74-419A-8815-64E723A2DEB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4942EF5C-B959-486A-B54F-599546E5549C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD4581A-CC36-41C2-96E3-94F199EB1630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACE1B105-A739-4E3C-9C85-75ED709F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98706A7-2A2C-452D-AC16-EBE49768DF51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "D035402F-A767-464C-9BB0-C4D09C1B1918",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE93BBEA-BDA7-4696-A0F4-6A6D1C37A055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F8ACAD-DFF5-469A-BC1F-C18DF3C499BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F13841FE-43D1-4B81-B015-F1F05F84237D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2084DA03-58F3-4C14-8F57-515F05D3A2B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CF70FF5-B7CA-4CD7-81BC-5077D613F6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E373009-8A10-4053-8553-2DCF83D066B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D94D15-4E9C-4C61-AA90-B3CA3C4880A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FEF93C2-7781-432C-A21D-C6AB63CAC54F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DF2D8B0-6D53-458D-A25E-995AE7AE9006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E418B4C-F862-4B5B-AA5F-18518CBCE85C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C3FCB26-B663-4FF6-AC20-B31C3322B29C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "0230D9A3-6EBB-447E-BDAE-15BFE77C4B65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDBB0E7-7A25-463B-BE85-6C690E09F11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AE5FA4-4209-4DE5-ACE8-F78465BFA13C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FCEDCC-F6B0-4DA3-9154-942884CDEAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A51B2DA6-5FFF-41BC-883E-FA94B6D68AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "3443B705-7180-4B61-8A6C-B803DD0F87FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0213598-2A05-4699-91E8-2A450F5457AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF3B95C-EEE5-4816-8014-90C9B0EC72F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB95DC84-32ED-4230-883D-F63DCA325550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC4BEDA-CB60-44A0-991A-02BB8B44818A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "443B4F89-3950-4DE7-8441-0B999852FD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C9EA205-82CC-4EA6-A6BD-9CBBECE3017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BF2FDF-45CA-43A7-A641-F4703EEB9065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "7648D9A7-06D6-4F41-B9A6-E661E5ADABD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "62574DA8-41B7-4587-816C-C5612D37C535",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "95D73261-4841-4C30-BDC4-A21FDF562EEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A493CC-B54B-4818-8023-4F63A245D3B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A93BDAF-FB26-4E43-B4CF-D6CA6C22034E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAFB9F26-F2C2-4790-8DA8-C8F5169CA049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D7B888B-5EBA-49E0-9E10-A2C598469663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB54207-C1AB-473A-931F-56B34070580C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE06AF78-1D1F-491E-BC55-A667D86ACB35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF548B41-C9AC-4281-97B8-884D08C4CD2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE250874-20BF-42A5-A809-3B49053D9FEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BB86E1-3CB2-42B8-91F4-3C957F613488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "95CBD089-9FBF-417F-9331-F999AF81EC9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.65:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F38C7D5-ED18-4526-8001-7A4600342C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.66:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F420E76-3AD3-43C3-B500-5C567408ABB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9682411-751E-4FE8-8022-9D1E6712B72D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12F60D5-A985-40BA-89CF-6B0E40CCB075",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.69:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D23E03F-A094-4CAB-B48E-F07363CCAF6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4D4641-2B73-4E27-BB27-BBF1855D9163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "81E506CF-FAD0-45ED-96A5-6F41BFEC1C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "125330FD-96E4-46E1-B792-ED1B96539197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "387362BA-AE02-48E0-A959-7B0DEBDCA4FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "55FFC6B5-A425-497D-91D7-5670326DE1A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "B947C5B6-7391-4285-B406-C2C6C9CE06E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "58AA2584-A9D1-47FB-BF76-663D717E1B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5FD2A9-CFD1-4697-B887-645B4A0E927B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "94798851-0ADB-4512-9FAF-7CD68B831D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.79:*:*:*:*:*:*:*",
              "matchCriteriaId": "D322C068-CEC3-4BFE-906A-FCE9ECABE0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.80:*:*:*:*:*:*:*",
              "matchCriteriaId": "C25F50B3-68A6-43C1-ABCC-454A91CA67B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.81:*:*:*:*:*:*:*",
              "matchCriteriaId": "B538776E-8F1B-4939-BA45-2EFE8DC8B9E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "03823ABA-0B39-4691-80CE-794875E07A49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:connman:connman:0.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F30A2F3-12C3-4213-B39F-883F79D622AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ConnMan before 0.85 does not ensure that netlink messages originate from the kernel, which allows remote attackers to bypass intended access restrictions and cause a denial of service via a crafted netlink message."
    },
    {
      "lang": "es",
      "value": "ConnMan antes 0.85 no garantiza que los mensajes netlink se originen en el n\u00facleo, lo que permite a atacantes remotos eludir restricciones de acceso y provocar una denegaci\u00f3n de servicio a trav\u00e9s de un mensaje netlink modificado."
    }
  ],
  "id": "CVE-2012-2320",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-05-18T22:55:06.013",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49033"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/49186"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/81704"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/53406"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=b0ec6eb4466acc57a9ea8be52c17b674b6ea0618"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=network/connman/connman.git%3Ba=commit%3Bh=c1b968984212b46bea1330f5ae029507b9bfded9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201205-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/07/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/81704"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=715172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75465"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…