Critical severity9.8NVD Advisory· Published Aug 29, 2017· Updated May 13, 2026
CVE-2017-12865
CVE-2017-12865
Description
Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted response query string passed to the "name" variable.
Affected products
2- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- git.kernel.org/pub/scm/network/connman/connman.git/commit/nvdIssue TrackingPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3956nvdThird Party Advisory
- www.securityfocus.com/bid/100498nvdThird Party AdvisoryVDB Entry
- 01.org/security/intel-oss-10001/intel-oss-10001nvdVendor Advisory
- security.gentoo.org/glsa/201812-02nvdThird Party Advisory
- www.nri-secure.com/blog/new-iot-vulnerability-connmandonvdThird Party Advisory
News mentions
0No linked articles in our index yet.