In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 10 Apr 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In ConnMan through 1.44, the lookup string in ns_resolv in dnsproxy.c can be NULL or an empty string when the TC (Truncated) bit is set in a DNS response. This allows attackers to cause a denial of service (application crash) or possibly execute arbitrary code, because those lookup values lead to incorrect length calculations and incorrect memcpy operations. | |
| Weaknesses | CWE-392 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-04-10T00:00:00.000Z
Updated: 2025-04-10T14:30:27.850Z
Reserved: 2025-04-10T00:00:00.000Z
Link: CVE-2025-32743
Updated: 2025-04-10T14:30:20.652Z
Status : Awaiting Analysis
Published: 2025-04-10T14:15:29.740
Modified: 2025-04-11T15:39:52.920
Link: CVE-2025-32743
No data.
ReportizFlow